Open Access   Article Go Back

Novel Approach for Intrusion Detection Using Back Propagation Algorithm

D.K. Singh1 , M. Shrivastava2

Section:Review Paper, Product Type: Journal Paper
Volume-07 , Issue-03 , Page no. 188-191, Feb-2019

Online published on Feb 15, 2019

Copyright © D.K. Singh, M. Shrivastava . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: D.K. Singh, M. Shrivastava, “Novel Approach for Intrusion Detection Using Back Propagation Algorithm,” International Journal of Computer Sciences and Engineering, Vol.07, Issue.03, pp.188-191, 2019.

MLA Style Citation: D.K. Singh, M. Shrivastava "Novel Approach for Intrusion Detection Using Back Propagation Algorithm." International Journal of Computer Sciences and Engineering 07.03 (2019): 188-191.

APA Style Citation: D.K. Singh, M. Shrivastava, (2019). Novel Approach for Intrusion Detection Using Back Propagation Algorithm. International Journal of Computer Sciences and Engineering, 07(03), 188-191.

BibTex Style Citation:
@article{Singh_2019,
author = {D.K. Singh, M. Shrivastava},
title = {Novel Approach for Intrusion Detection Using Back Propagation Algorithm},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {2 2019},
volume = {07},
Issue = {03},
month = {2},
year = {2019},
issn = {2347-2693},
pages = {188-191},
url = {https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=705},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=705
TI - Novel Approach for Intrusion Detection Using Back Propagation Algorithm
T2 - International Journal of Computer Sciences and Engineering
AU - D.K. Singh, M. Shrivastava
PY - 2019
DA - 2019/02/15
PB - IJCSE, Indore, INDIA
SP - 188-191
IS - 03
VL - 07
SN - 2347-2693
ER -

           

Abstract

Intruders are available anywhere. They want to take the benefits of the hidden or confidential information of the user. They are trying access by the different – different techniques. Intruder finding is a big problem at the current time. So that security is important to secure our system or confidential information of any organization. Intrusion Detection System (IDS) is a popular technique for finding intruders that will be available on a network. We will use the KDD CUP 99 dataset for the training purpose of the Back Propagation based IDS model. BPN is an algorithm of the artificial neural network. KDD CUP 99 dataset are authentic dataset for the intruders. This data set will be collected by the UCI Repository.

Key-Words / Index Term

Intrusion Detection System (IDS), Backpropagation (BPN) algorithm, Cloud Computing (CC), Support Vector Machine (SVM), Network Intrusion Detection System

References

[1] Neda Afzali Seresht, Reza Azmi: “MAID-IDS, A distributed IDS using multi-agent AIS approach", Elsevier, published the Journal of Engineering Applications of Artificial Intelligence, 35, pp 286-298, 2014.
[2] Yuxin Meng, Lam-For Kwok “Adaptive Non-critical alarm reduction using Hash-based Contextual signatures in intrusion detection", Elsevier, published in the Journal of Computer Communications, 38, pp 50-59, 2014.
[3] Chirag Modi, Dhiren Patel, Bhavesh Borisanya, Hiren Patel, Avi Patel, Muttukrishnan Rajaranjan “A survey of intrusion detection techniques in Cloud”, Elsevier, published the Journal of Network and Computer Applications, Vol.-35, Issue-1, pp 42-57, 2013.
[4] Igino Corona, Giorgio Giacinto, Fabio Roli, 2013 "Adversarial attacks against intrusion detection systems: Taxonomy, solutions and open issues", Elsevier, published in the Journal of Information Sciences, Elsevier, 239, pp 201-225, 2013.
[5] Hesham Altwaijry, Saeed Algarny "Bayesian-based intrusion detection system", King Saud University, published in Journal of King Saud University – Computer and Information Sciences, Producing and Hosting by Elsevier, 24, pp 1-6, 2012.
[6] Shahaboddin Shamshirband, Nor Badrul Anuar, Miss Laiha Mat Kiah, Ahmed Patel "An appraisal and Design of a multi-agent system based on computational intelligence techniques", published in Science Direct, Elsevier, pp 2105-2127, 2013.
[7] Guisong Liu, Zhang Yi, Shangming Yang "A hierarchical intrusion detection model based on the PCA neural networks", published in Science Direct, Elsevier, pp 1561-1568, 2007.
[8] P. Arun Raj Kumar, S. Selvakumar "Distributed denial of service attack detection using an ensemble of neural classifier", Elsevier, published in the Journal of Computer Communications, pp 1328-1341, 2011.
[9] Bin Luo, Jingbo Xia "A novel intrusion detection system based on feature generation with visualization strategy", Elsevier, published the Journal of Expert Systems with Applications, pp 4139-4147, 2014.
[10] Mohsen Rouached, Hassen Sallay "An Efficient Formal Framework for Intrusion Detection Systems", Elsevier, published the journal of Procedia Computer Science, 10, pp 968-975, 2012.
[11] https://technet.microsoft.com/en-us/library/cc959354.aspx

[12] Mahbod Tavallaee "Detail Analysis of the KDD CUP 99 Data Set", Proceeding of the 2009 IEEE Symposium on Computational Intelligence in Security and Defense application (CISDA 2009), 2009.
[13] Wikipedia, www.wikipedia.org.
[14] Data collection form Knowledge Discovery Dataset, UCI Repository http://kdd.ics.uci.edu/databases/kddcup99.