Skip to main content

Anomaly-Based NIDS Using Artificial Neural Networks Optimised with Cuckoo Search Optimizer

  • Conference paper
  • First Online:
Emerging Research in Electronics, Computer Science and Technology

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 545))

Abstract

Anomaly detection in network traffic is one of the major concerns for the researches and the network administrators. Presence of anomalies in network traffic could indicate a possible intrusion on the network, increasing the need for a fast and reliable network intrusion detection system (NIDS). A novel method of using an artificial neural network (ANN) optimised with Cuckoo Search Optimizer (CSO) is developed in this research paper to act as network monitoring and anomaly detection system. Two subsets of the KDD Cup 99 dataset have been considered to train and test our model, one of 2000 instances and the other of 10,000 instances, along with the complete dataset of 61,593 instances and I have compared the result with the BCS-GA algorithm and the fuzzy K-means clustering algorithm optimised with PSO in terms of precision, recall and f1-score, and the training time for the model with the selected database instances.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Yang H, Xie F Lu Y (2006) Research on network anomaly detection based on clustering and classifier. In: 2006 International conference on computational intelligence and security, Guangzhou, pp 592–597

    Google Scholar 

  2. Common Types of Network Attacks—Microsoft Docs

    Google Scholar 

  3. Holm H (2014) Signature based intrusion detection for zero-day attacks. In: 2014 47th Hawaii international conference on system sciences, Waikoloa, HI, pp 4895–4904

    Google Scholar 

  4. Zhang W, Yang Q, Geng Y (2009) A survey of anomaly detection methods in networks. In: 2009 International symposium on computer network and multimedia technology, Wuhan, pp 1–3

    Google Scholar 

  5. Almansob SM Lomte SS (2017) Addressing challenges for intrusion detection system using naive Bayes and PCA algorithm. In: 2017 2nd international conference for convergence in technology (I2CT), Mumbai, pp 565–568

    Google Scholar 

  6. Mabu S, Chen C, Lu N, Shimada K Hirasawa K (2011) An intrusion-detection model based on fuzzy class-association-rule mining using genetic network programming. IEEE Trans Syst Man Cybern Part C (Appl Rev) 41(1):130–139

    Google Scholar 

  7. Kevric J, Jukic S, Subasi A (2016) An effective combining classifier approach using tree algorithms for network intrusion detection. Neural Comput Appl 1–8

    Google Scholar 

  8. Lei Y (2017) Network anomaly traffic detection algorithm based on SVM. In: 2017 International conference on robots and intelligent system (ICRIS), Huai’an, pp 217–220. https://doi.org/10.1109/ICRIS.2017.61

  9. Thakong M, Wongthanavasu S (2007) Packet header anomaly detection using bayesian belief network. ECTI Trans Comput Inf Technol 3(1)

    Google Scholar 

  10. Li W, Duan M, Chen Y (2008) Network anomaly detection based on MRMHC-SVM algorithm. In: 2008 IEEE international multitopic conference, Karachi, pp 307–312

    Google Scholar 

  11. Al-Janabi STF, Saeed HA (2011) A neural network based anomaly intrusion detection system. In: 2011 Developments in e-systems engineering, Dubai, pp 221–226

    Google Scholar 

  12. Su M-Y (2011) Real-time anomaly detection systems for Denial-of-Service attacks by weighted k-nearest-neighbor classifiers. Expert Syst Appl 38(4):3492–3498

    Article  Google Scholar 

  13. Singh S, Silakari S (2009) An ensemble approach for feature selection of cyber attack dataset. Int J Comput Sci Inf Secur P12-(IJCSIS) 6(2)

    Google Scholar 

  14. Peddabachigari S, Abraham A, Grosan C, Thomas J (2007) Modeling intrusion detection system using hybrid intelligent systems. J Netw Comput Appl 30(1):114–132

    Google Scholar 

  15. Lin WC, Ke SW, Tsai CF (2015) CANN: an intrusion detection system based on combining cluster centers and nearest neighbors. Knowl-Based Syst

    Google Scholar 

  16. Li H (2010) Research and implementation of an anomaly detection model based on clustering analysis. In: 2010 International symposium on intelligence information processing and trusted computing, Huanggang, pp 458–462

    Google Scholar 

  17. Leon E, Nasraoui O Gomez J (2004) Anomaly detection based on unsupervised niche clustering with application to network intrusion detection. In: Proceedings of the 2004 congress on evolutionary computation (IEEE Cat. No. 04TH8753), vol 1, pp 502–508

    Google Scholar 

  18. Jidiga GR, Sammulal P (2014) Anomaly detection using machine learning with a case study. In: 2014 IEEE international conference on advanced communications, control and computing technologies, Ramanathapuram, pp 1060–1065

    Google Scholar 

  19. Callegari C, Giordano S, Pagano M (2014) Neural network based anomaly detection. In: 2014 IEEE 19th international workshop on computer aided modeling and design of communication links and networks (CAMAD), Athens, pp 310–314

    Google Scholar 

  20. Han S-J, Cho S-B (2005) Evolutionary neural networks for anomaly detection based on the behavior of a program. IEEE Trans Syst Man Cybern Part B (Cybernetics) 36(3):559–570

    Article  MathSciNet  Google Scholar 

  21. Andropov S, Guirik A, Budko M, Budko M (2017) Network anomaly detection using artificial neural networks. In: 2017 20th conference of open innovations association (FRUCT), St. Petersburg

    Google Scholar 

  22. Naik M, Nath MR, Wunnava A, Sahany S, Panda R (2015) A new adaptive Cuckoo search algorithm. In: 2015 IEEE 2nd international conference on recent trends in information systems (ReTIS), Kolkata, pp 1–5

    Google Scholar 

  23. Majumdar D, Mallick S (2016) Cuckoo search algorithm for constraint satisfaction and optimization. In: 2016 Second international conference on research in computational intelligence and communication networks (ICRCICN), Kolkata, pp 235–240

    Google Scholar 

  24. Zhao P, Li H (2012) Opposition-based Cuckoo search algorithm for optimization problems. In: 2012 Fifth international symposium on computational intelligence and design, Hangzhou, pp 344–347

    Google Scholar 

  25. Yang XS, Deb S (2009) Cuckoo search via Lévy flights. In: 2009 World congress on nature and biologically inspired computing (NaBIC), Coimbatore, pp 210–214

    Google Scholar 

  26. Hamamoto AH, Carvalho LF, Sampaio LDH, Abrão T, Proença ML (2018) Network anomaly detection system using genetic algorithm and fuzzy logic. Expert Syst Appl 92:390–402

    Google Scholar 

  27. Ali MH, Al Mohammed BAD, Ismail A, Zolkipli MF (2018) A new intrusion detection system based on fast learning network and particle swarm optimization. IEEE Access 6:20255–20261

    Google Scholar 

  28. Koehrsen W (2018) Beyond accuracy: precision and recall—towards data science

    Google Scholar 

  29. Ghosh P, Jha S, Dutta R, Phadikar S (2018) Intrusion detection system based on BCS-GA in cloud environment. In: Shetty N, Patnaik L, Prasad N, Nalini N (eds) Emerging research in computing, information, communication and applications. ERCICA 2016. Springer, Singapore

    Google Scholar 

  30. Ensafi R, Dehghanzadeh S, Akbarzadeh TMR (2008) Optimizing fuzzy k-means for network anomaly detection using PSO. In: 2008 IEEE/ACS international conference on computer systems and applications, Doha, pp 686–693

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to K. Rithesh .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Rithesh, K. (2019). Anomaly-Based NIDS Using Artificial Neural Networks Optimised with Cuckoo Search Optimizer. In: Sridhar, V., Padma, M., Rao, K. (eds) Emerging Research in Electronics, Computer Science and Technology. Lecture Notes in Electrical Engineering, vol 545. Springer, Singapore. https://doi.org/10.1007/978-981-13-5802-9_3

Download citation

  • DOI: https://doi.org/10.1007/978-981-13-5802-9_3

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-13-5801-2

  • Online ISBN: 978-981-13-5802-9

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics