Proceedings of the 2015 ACM SIGMIS Conference on Computers and People Research 2015
DOI: 10.1145/2751957.2751979
|View full text |Cite
|
Sign up to set email alerts
|

An Efficient Approach to Develop an Intrusion Detection System Based on Multi Layer Backpropagation Neural Network Algorithm

Abstract: The key success factor of the business depends upon correct and timely information. The vital resources of the organization should be protected from inside and outside threats. Among many threats of network security, intrusion has become a crucial reason for many organizations to incur loss. Many researchers are trying their level best to handle the different types of intrusion affecting the business. To detect such a type of intrusion, our initiative is to us a very popular soft computing tool namely back pro… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 15 publications
(5 citation statements)
references
References 5 publications
0
5
0
Order By: Relevance
“…Also, the genetic approaches for IDS are very much successful as reported by S. Malhotra et al [4]. Nonetheless, the works by R. Sen et al [5] using artificial neural network, M. Tabatabaefar et al [6] using artificial immune systems and the work by T. Mehmood et al [7] using ant colony optimization have demonstrated higher accuracy but at the cost of higher time complexity and at the compromise of newer attack detection. Elaborating the same, although SVM based IDS can enhance IDS execution regarding identification rate and learning speed contrasted and conventional calculations, opportunity to get better still exists.…”
Section: Outcome Of the Parallel Research Workmentioning
confidence: 97%
“…Also, the genetic approaches for IDS are very much successful as reported by S. Malhotra et al [4]. Nonetheless, the works by R. Sen et al [5] using artificial neural network, M. Tabatabaefar et al [6] using artificial immune systems and the work by T. Mehmood et al [7] using ant colony optimization have demonstrated higher accuracy but at the cost of higher time complexity and at the compromise of newer attack detection. Elaborating the same, although SVM based IDS can enhance IDS execution regarding identification rate and learning speed contrasted and conventional calculations, opportunity to get better still exists.…”
Section: Outcome Of the Parallel Research Workmentioning
confidence: 97%
“…Rinku Sen et al [20] have developed a flexible back propagation neural network (BPNN) architecture to identify the intrusion based on anomaly detection approach. To look for the best architecture, they have tested different combinations of hidden layers and various neurons in each hidden layers with three distinct percentage split of the KDD dataset, namely 6-40 percent split, 70-30 percent split and 80-20 percent split.…”
Section: Literature Reviewmentioning
confidence: 99%
“…These nodes operate independently. BPNN is a special type of neural network [20]. It is also named error back propagation neural network, and it is a feed forward neural network which uses Multilayer Perception (MLP) as network architecture and Back Propagation Learning Algorithm as training or learning algorithm.…”
Section: Back Propagation Neural Network (Bpnn)mentioning
confidence: 99%
“…Intrusion detection of the network has become the most important part of information security defense network infrastructure. A selection of algorithms is used to identify and distinguish irregularity or assault in NIDS traffic networks, such as a Decision Tree [10], K-nearest neighbor (K-NN) [11], the naive Bayes Network [12], SOM [13], and SVM Network (ANN).…”
Section: Existing Workmentioning
confidence: 99%