Intelligent intrusion detection systems using artificial neural networks

SHENFIELD, Alex, DAY, David and AYESH, Aladdin (2018). Intelligent intrusion detection systems using artificial neural networks. ICT Express. [Article]

Documents
20882:561243
[thumbnail of Shenfield-IntelligentIntrusionDetection(VoR).pdf]
Preview
PDF
Shenfield-IntelligentIntrusionDetection(VoR).pdf - Published Version
Available under License Creative Commons Attribution Non-commercial No Derivatives.

Download (943kB) | Preview
Abstract
This paper presents a novel approach to detection of malicious network traffic using artificial neural networks suitable for use in deep packet inspection based intrusion detection systems. Experimental results using a range of typical benign network traffic data (images, dynamic link library files, and a selection of other miscellaneous files such as logs, music files, and word processing documents) and malicious shell code files sourced from the online exploit and vulnerability repository exploitdb \cite{exploitdb}, have show that the proposed artificial neural network architecture is able to distinguish between benign and malicious network traffic accurately. The proposed artificial neural network architecture obtains an average accuracy of 98\%, an average area under the receiver operator characteristic curve of 0.98, and an average false positive rate of less than 2% in repeated 10-fold cross-validation. This shows that the proposed classification technique is robust, accurate, and precise. The novel approach to malicious network traffic detection proposed in this paper has the potential to significantly enhance the utility of intrusion detection systems applied to both conventional network traffic analysis and network traffic analysis for cyber-physical systems such as smart-grids.
More Information
Statistics

Downloads

Downloads per month over past year

Metrics

Altmetric Badge

Dimensions Badge

Share
Add to AnyAdd to TwitterAdd to FacebookAdd to LinkedinAdd to PinterestAdd to Email

Actions (login required)

View Item View Item