Detection of Malicious Activities in Computer Network Using Soft Computing

D.P. Gaikwad*, Kiran Kale**, Shabnoor Pathan***, Lokesh Chandawar****, Vivek Firake*****
* Assistant Professor, Department of Computer Engineering, AISSMS'S College Of Engineering, Pune
**-***** Students, Department of Computer Engineering, All India ShriShivaji Memorial Society's College of Engineering, Pune.
Periodicity:July - September'2014
DOI : https://doi.org/10.26634/jse.9.1.3209

Abstract

With the increased use of internet, cyber threats have increased exponentially. To prevent our system from such threats, we need an anomaly detection system that will inspect all the network activities and identify any suspicious pattern that may indicate breach of security resulting in damage of computing resources. In this paper, the authors are introducing anomaly detection system that uses multilayer perceptron, a model of Artificial Neural Network (ANN). In this system, Multilayer Perceptron uses backpropagation learning algorithm. For training and testing purpose, they have used NSLKDD dataset. The trained model of Multilayer Perceptron is then used for real-time anomaly detection using tcpdump (packet sniffing tool in Linux). This system has successfully achieved a very low false-positive rate.

Keywords

ANN, Multilayer Perceptron, Anomaly Detection, NSL-KDD.

How to Cite this Article?

Gaikwad.D.P., Kale,K., Pathan,S., Chandawar,L., and Firake,V. (2014). Detection of Malicious Activities in Computer Network Using Soft Computing. i-manager’s Journal on Software Engineering, 9(1), 9-16. https://doi.org/10.26634/jse.9.1.3209

References

[1]. Hua TANG, ZhuolinCAO (2009). ”Machine learning based Intrusion Detection Algorithms”, Journal of Computational Information Systems Vol. 5, pp. 61825- 1831.
[2]. Laheeb Mohammad Ibrahim (2010). “Anamoly network intrusion detection system based on distributed time-delay neural network (DTDNN)”, Journal of Engineering Science and Technology, Vol. 5, pp. 4457- 471.
[3]. Mukhopadhyay1, MChakraborty, S Chakrabarti, T Chatterjee (2011). "Back Propagation Neural Network Approach for Intrusion Detection System", International Conference on Recent Trends in Information Systems, IEEE Publication.
[4]. Sufyan T. Faraj Al-Janabi, Hadeel Amjed Saeed (2011). “A Neural Network Based Anomaly Intrusion Detection System”, Developments in E-systems Engineering, IEEE Publication - 978-0-7695-4593-6/11, DOI 0.1109/DeSE.2011.19
[5]. Devikrishna K S, Ramakrishna B B (2013). "An Artificial Neural Network based Intrusion Detection System and Classification of Attacks", International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622,Vol. 3, Issue 4, Jul-Aug 2013, pp. 1959-1964.
[6]. Ryan, J., Lin, M., & Miikkulainen, R. (1998). ”Intrusion detection with neural networks”. Advances in Neural Information Processing Systems”, Vol.10 Cambridge, MA:Springer.
[7]. T. Zhou and LI Yang (2008). "The Research of Intrusion Detection Based on Genetic NeuralNetwork", Proceedings of the 2008 International Conference on Wavelet Analysis and Pattern Recognition, Hong Kong, IEEE.
[8]. M. Vallipuram and B. Robert (2004). "An Intelligent Intrusion Detection System based on Neural Network", IADIS International Conference Applied Computing.
[9]. DimaNovikov, Roman V. Yampolskiy and Leon Reznik (2006). “Anomaly Detection Based Intrusion Detection”, Proceedings of the Third International Conference on Information Technology: New Generations, IEEE.
[10]. Ghosh, A.K., Wanken, J. and Charron, F. (1998). “Detecting Anomalous and Unknown Intrusions against Programs”, Proceedings of the Annual Computer Security Applications Conference (ACSAC'98), December 1998
[11]. Mahbod Tavallaee, Ebrahim Bagheri, Wei Lu, and Ali A. Ghorbani (2009). “ A Detailed Analysis of the KDD CUP 99 Data Set”, Proceedings of the 2009 IEEE Symposium on Computational Intelligence in Security and Defense Applications (CISDA 2009)
[12]. S.Rajasekaran, G.A.VijayalakshmiPai (2007). “Neural Networks, Fuzzy Logic and Genetic Algorithms Synthesis and Applications”, PHI, ISBN-978-81-203-2186- 1, February, 2007
[13]. MonowarH.Bhuyan, D.K. Bhattacharyya and J.K. Kalita (2014). “Network Anomaly Detection: Methods, Systems and Tools”, IEEE Communications Surveys & Tutorials, Vol. 16, No.1, FIRST QUARTER, 2014.
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Pdf 35 35 200 20
Online 35 35 200 15
Pdf & Online 35 35 400 25

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.