{"title":"网络入侵检测中反向传播算法变体的比较分析","authors":"N. Neupane, S. Shakya","doi":"10.1109/CCAA.2017.8229917","DOIUrl":null,"url":null,"abstract":"The system security has turned into an extremely critical worry as system assaults have been extending with the ascent of hacking devices, inconvenience of systems and interruptions in number and brutality. This paper is centered around interruption identification by utilizing Multilayer Perceptron (MLP) with various calculation of backpropagation neural network. In this paper, performance of various backpropagation algorithms has been evaluated using KDDCup99 dataset. The dataset has been preprocessed to be made suitable for neural network input and the input set and target set are separated. The modified dataset has been used to evaluate the performance of BFGS Quasi-Newton, Levenberg-Marquardt, and Gradient Descent with Adaptive backpropagation algorithm. Different performance parameters such as mean square error, attack detection rate, recall rate, precision rate, epochs has been used for the algorithm comparison. Based on the evaluation results, the research purposes Levenberg-Marquardt backpropagation algorithm to be the best performing and efficient algorithm for the network intrusion detection for KDD Cup dataset. Different classes of attacks have been also determined comparing the output values obtained with the target set.","PeriodicalId":6627,"journal":{"name":"2017 International Conference on Computing, Communication and Automation (ICCCA)","volume":"32 1","pages":"726-729"},"PeriodicalIF":0.0000,"publicationDate":"2017-05-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":"{\"title\":\"Comparative analysis of backpropagation algorithm variants for network intrusion detection\",\"authors\":\"N. Neupane, S. Shakya\",\"doi\":\"10.1109/CCAA.2017.8229917\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The system security has turned into an extremely critical worry as system assaults have been extending with the ascent of hacking devices, inconvenience of systems and interruptions in number and brutality. This paper is centered around interruption identification by utilizing Multilayer Perceptron (MLP) with various calculation of backpropagation neural network. In this paper, performance of various backpropagation algorithms has been evaluated using KDDCup99 dataset. The dataset has been preprocessed to be made suitable for neural network input and the input set and target set are separated. The modified dataset has been used to evaluate the performance of BFGS Quasi-Newton, Levenberg-Marquardt, and Gradient Descent with Adaptive backpropagation algorithm. Different performance parameters such as mean square error, attack detection rate, recall rate, precision rate, epochs has been used for the algorithm comparison. Based on the evaluation results, the research purposes Levenberg-Marquardt backpropagation algorithm to be the best performing and efficient algorithm for the network intrusion detection for KDD Cup dataset. Different classes of attacks have been also determined comparing the output values obtained with the target set.\",\"PeriodicalId\":6627,\"journal\":{\"name\":\"2017 International Conference on Computing, Communication and Automation (ICCCA)\",\"volume\":\"32 1\",\"pages\":\"726-729\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-05-05\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"5\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2017 International Conference on Computing, Communication and Automation (ICCCA)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CCAA.2017.8229917\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 International Conference on Computing, Communication and Automation (ICCCA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CCAA.2017.8229917","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Comparative analysis of backpropagation algorithm variants for network intrusion detection
The system security has turned into an extremely critical worry as system assaults have been extending with the ascent of hacking devices, inconvenience of systems and interruptions in number and brutality. This paper is centered around interruption identification by utilizing Multilayer Perceptron (MLP) with various calculation of backpropagation neural network. In this paper, performance of various backpropagation algorithms has been evaluated using KDDCup99 dataset. The dataset has been preprocessed to be made suitable for neural network input and the input set and target set are separated. The modified dataset has been used to evaluate the performance of BFGS Quasi-Newton, Levenberg-Marquardt, and Gradient Descent with Adaptive backpropagation algorithm. Different performance parameters such as mean square error, attack detection rate, recall rate, precision rate, epochs has been used for the algorithm comparison. Based on the evaluation results, the research purposes Levenberg-Marquardt backpropagation algorithm to be the best performing and efficient algorithm for the network intrusion detection for KDD Cup dataset. Different classes of attacks have been also determined comparing the output values obtained with the target set.