Abstract
Anomaly detection in network traffic is one of the major concerns for the researches and the network administrators. Presence of anomalies in network traffic could indicate a possible intrusion on the network, increasing the need for a fast and reliable network intrusion detection system (NIDS). A novel method of using an artificial neural network (ANN) optimised with Cuckoo Search Optimizer (CSO) is developed in this research paper to act as network monitoring and anomaly detection system. Two subsets of the KDD Cup 99 dataset have been considered to train and test our model, one of 2000 instances and the other of 10,000 instances, along with the complete dataset of 61,593 instances and I have compared the result with the BCS-GA algorithm and the fuzzy K-means clustering algorithm optimised with PSO in terms of precision, recall and f1-score, and the training time for the model with the selected database instances.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Yang H, Xie F Lu Y (2006) Research on network anomaly detection based on clustering and classifier. In: 2006 International conference on computational intelligence and security, Guangzhou, pp 592–597
Common Types of Network Attacks—Microsoft Docs
Holm H (2014) Signature based intrusion detection for zero-day attacks. In: 2014 47th Hawaii international conference on system sciences, Waikoloa, HI, pp 4895–4904
Zhang W, Yang Q, Geng Y (2009) A survey of anomaly detection methods in networks. In: 2009 International symposium on computer network and multimedia technology, Wuhan, pp 1–3
Almansob SM Lomte SS (2017) Addressing challenges for intrusion detection system using naive Bayes and PCA algorithm. In: 2017 2nd international conference for convergence in technology (I2CT), Mumbai, pp 565–568
Mabu S, Chen C, Lu N, Shimada K Hirasawa K (2011) An intrusion-detection model based on fuzzy class-association-rule mining using genetic network programming. IEEE Trans Syst Man Cybern Part C (Appl Rev) 41(1):130–139
Kevric J, Jukic S, Subasi A (2016) An effective combining classifier approach using tree algorithms for network intrusion detection. Neural Comput Appl 1–8
Lei Y (2017) Network anomaly traffic detection algorithm based on SVM. In: 2017 International conference on robots and intelligent system (ICRIS), Huai’an, pp 217–220. https://doi.org/10.1109/ICRIS.2017.61
Thakong M, Wongthanavasu S (2007) Packet header anomaly detection using bayesian belief network. ECTI Trans Comput Inf Technol 3(1)
Li W, Duan M, Chen Y (2008) Network anomaly detection based on MRMHC-SVM algorithm. In: 2008 IEEE international multitopic conference, Karachi, pp 307–312
Al-Janabi STF, Saeed HA (2011) A neural network based anomaly intrusion detection system. In: 2011 Developments in e-systems engineering, Dubai, pp 221–226
Su M-Y (2011) Real-time anomaly detection systems for Denial-of-Service attacks by weighted k-nearest-neighbor classifiers. Expert Syst Appl 38(4):3492–3498
Singh S, Silakari S (2009) An ensemble approach for feature selection of cyber attack dataset. Int J Comput Sci Inf Secur P12-(IJCSIS) 6(2)
Peddabachigari S, Abraham A, Grosan C, Thomas J (2007) Modeling intrusion detection system using hybrid intelligent systems. J Netw Comput Appl 30(1):114–132
Lin WC, Ke SW, Tsai CF (2015) CANN: an intrusion detection system based on combining cluster centers and nearest neighbors. Knowl-Based Syst
Li H (2010) Research and implementation of an anomaly detection model based on clustering analysis. In: 2010 International symposium on intelligence information processing and trusted computing, Huanggang, pp 458–462
Leon E, Nasraoui O Gomez J (2004) Anomaly detection based on unsupervised niche clustering with application to network intrusion detection. In: Proceedings of the 2004 congress on evolutionary computation (IEEE Cat. No. 04TH8753), vol 1, pp 502–508
Jidiga GR, Sammulal P (2014) Anomaly detection using machine learning with a case study. In: 2014 IEEE international conference on advanced communications, control and computing technologies, Ramanathapuram, pp 1060–1065
Callegari C, Giordano S, Pagano M (2014) Neural network based anomaly detection. In: 2014 IEEE 19th international workshop on computer aided modeling and design of communication links and networks (CAMAD), Athens, pp 310–314
Han S-J, Cho S-B (2005) Evolutionary neural networks for anomaly detection based on the behavior of a program. IEEE Trans Syst Man Cybern Part B (Cybernetics) 36(3):559–570
Andropov S, Guirik A, Budko M, Budko M (2017) Network anomaly detection using artificial neural networks. In: 2017 20th conference of open innovations association (FRUCT), St. Petersburg
Naik M, Nath MR, Wunnava A, Sahany S, Panda R (2015) A new adaptive Cuckoo search algorithm. In: 2015 IEEE 2nd international conference on recent trends in information systems (ReTIS), Kolkata, pp 1–5
Majumdar D, Mallick S (2016) Cuckoo search algorithm for constraint satisfaction and optimization. In: 2016 Second international conference on research in computational intelligence and communication networks (ICRCICN), Kolkata, pp 235–240
Zhao P, Li H (2012) Opposition-based Cuckoo search algorithm for optimization problems. In: 2012 Fifth international symposium on computational intelligence and design, Hangzhou, pp 344–347
Yang XS, Deb S (2009) Cuckoo search via Lévy flights. In: 2009 World congress on nature and biologically inspired computing (NaBIC), Coimbatore, pp 210–214
Hamamoto AH, Carvalho LF, Sampaio LDH, Abrão T, Proença ML (2018) Network anomaly detection system using genetic algorithm and fuzzy logic. Expert Syst Appl 92:390–402
Ali MH, Al Mohammed BAD, Ismail A, Zolkipli MF (2018) A new intrusion detection system based on fast learning network and particle swarm optimization. IEEE Access 6:20255–20261
Koehrsen W (2018) Beyond accuracy: precision and recall—towards data science
Ghosh P, Jha S, Dutta R, Phadikar S (2018) Intrusion detection system based on BCS-GA in cloud environment. In: Shetty N, Patnaik L, Prasad N, Nalini N (eds) Emerging research in computing, information, communication and applications. ERCICA 2016. Springer, Singapore
Ensafi R, Dehghanzadeh S, Akbarzadeh TMR (2008) Optimizing fuzzy k-means for network anomaly detection using PSO. In: 2008 IEEE/ACS international conference on computer systems and applications, Doha, pp 686–693
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Rithesh, K. (2019). Anomaly-Based NIDS Using Artificial Neural Networks Optimised with Cuckoo Search Optimizer. In: Sridhar, V., Padma, M., Rao, K. (eds) Emerging Research in Electronics, Computer Science and Technology. Lecture Notes in Electrical Engineering, vol 545. Springer, Singapore. https://doi.org/10.1007/978-981-13-5802-9_3
Download citation
DOI: https://doi.org/10.1007/978-981-13-5802-9_3
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-5801-2
Online ISBN: 978-981-13-5802-9
eBook Packages: EngineeringEngineering (R0)