DOI QR코드

DOI QR Code

Analyzing Effective of Activation Functions on Recurrent Neural Networks for Intrusion Detection

  • Le, Thi-Thu-Huong (School of Computer Science and Engineering, Pusan National University) ;
  • Kim, Jihyun (School of Computer Science and Engineering, Pusan National University) ;
  • Kim, Howon (School of Computer Science and Engineering, Pusan National University)
  • Received : 2016.07.02
  • Accepted : 2016.07.28
  • Published : 2016.09.30

Abstract

Network security is an interesting area in Information Technology. It has an important role for the manager monitor and control operating of the network. There are many techniques to help us prevent anomaly or malicious activities such as firewall configuration etc. Intrusion Detection System (IDS) is one of effective method help us reduce the cost to build. The more attacks occur, the more necessary intrusion detection needs. IDS is a software or hardware systems, even though is a combination of them. Its major role is detecting malicious activity. In recently, there are many researchers proposed techniques or algorithms to build a tool in this field. In this paper, we improve the performance of IDS. We explore and analyze the impact of activation functions applying to recurrent neural network model. We use to KDD cup dataset for our experiment. By our experimental results, we verify that our new tool of IDS is really significant in this field.

Keywords

References

  1. P. Laskov et al., "Learning intrusion detection: Supervised or unsupervised?," In Image Analysis and Processing ICIAP 2005, vol. 3617 of Lecture Notes in Computer Science, pp.50-57, Springer Berlin Heidelberg, 2005.
  2. W. Lee and S. J. Stolfo, "Data mining approaches for instrusion detection," In Proceedings of the 7th USENIX Security Symposium, vol. 7, pp. 6-6, Berkeley, CA, USA, 1998.
  3. C. Sinclair et al., "An application of machine learning to network instrution detection," In Proceeding of the 15th Annual Computer Security Applications Conferences, ACSAC'99, Washington, DC, USA, 1999.
  4. W. Li, "Using genetic algorithm for network intrusion detection," In Proceedings of the US DoE Cybersecurity Conference, Kansas City, KS, USA, 2004.
  5. S. Mukkamala, G. Janoski and A. Sung, "Intrusion detection using neural networks and support vector machines," In Proceedings of the 2002 International Joint Conference on Neural Networks (IJCNN), vol. 2, pp. 1702-1707, 2002.
  6. J. Gomer and D. Dasgupta, "Evolving fuzzy classifiers for intrusion detection," In Proceedings of the 2002 IEEE Workshop on Information Assurance West Point, NY, USA, 2002.
  7. A. Steven, S. Forrest and A. Somayaji, "Intrusion detection using sequences of system calls," Journal of Computer Security, vol. 6, no. 3, pp. 151-180, August 1998. https://doi.org/10.3233/JCS-980109
  8. J. Kim, J. Peter, U. Aickelin, J. Greensmith, G. Tedesco and J. Twycross, "Immune system approaches to intrusion detection," Natureal Computing, vol. 6, no. 4, pp. 413-466, December 2007. https://doi.org/10.1007/s11047-006-9026-4
  9. M. Zamani et al., "A DDoS-aware IDS model based on danger theory and mobile agents," In Proceedings of the 2009 International Conferences on Computational Intelligence and Security, vol. 1, pp. 516-520, 2009.
  10. M. Zamani et al., "A danger-based approach to intrsusion detection," CoRR, 2014.
  11. X. Glorot, A. Bordes and Y. Bengio, "Deep sparse rectifier neural networks," International Conference on Artificial Intelligence and Statistics, 2011.
  12. V. Nair and G. E. Hinton, "Rectified linear units improve restricted boltzmann machines," Proceedings of the 27th International Conference on Machine Learning, 2010.
  13. A. L. Mass, A. Y. Hannun, and A. Y. Ng, "Rectifier nonlinearities improve neural network acoustic models," In ICML, vol. 30, 2013.
  14. D. Clevert, T. Unterthiner and S. HochreiterAcb, "Fast and Accuracy Deep Network Learning by Exponential Linear Units," http:/arxiv.org/abs/1511.07289, 2016.
  15. K. Jihyun, K. Jaehyun, L. T. T. Huong and K. Howon, "Long Short Term Memory Recurrent Neural Network Classifier for Intrusion Detection," International Conference on Platform Technology and Service, 2015.