skip to main content
10.1145/3171592.3171598acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicnccConference Proceedingsconference-collections
research-article

An Intrusion Detection Model Based on Deep Belief Network

Published: 08 December 2017 Publication History

Abstract

The method of network intrusion detection based on deep learning is the hotspot of current research. This paper presents an intrusion detection model based on deep belief network and analyzes the NSL-KDD dataset. The experimental results show that the algorithm improves the detection of abnormal behavior pattern data and satisfies the requirement of high efficiency and reliability of intrusion detection system.

References

[1]
Anderson J P. Computer security threat monitoring and surveillance{R}. Technical report, James P. Anderson Company, Fort Washington, Pennsylvania, 1980.
[2]
Tsai C F,Hsu Y F,Lin C Y,et al.Intrusion detection by machine learning:A review{J}. Expert System with Applications, 2009,36(10):11994--12000.
[3]
Shah B,Trivedi B H.Artificial neural network based intrusion detection systems:a survey{J}. International Journal of Computer Applications.2012,39(6):13--18.
[4]
Rao X, Dong C X,Yang S Q. An Intrusion Detection System Based on Support Vector Machine{J}. Journal of Software,2003.14(4):798--803.
[5]
MS Pervez,DM Farid. Feature selection and intrusion classification in NSL-KDD cup 99 dataset employing SVMs{J}. International Conference on Software,2015:1--6
[6]
S Lakhina,S Joseph,B Verma. Feature Reduction using Principal Component Analysis for Effective Anomaly--Based Intrusion Detection on NSL-KDD{J}. International Journal of Engineering Science & Technology,2010,2(6):3175--3180
[7]
Hinton G E,Osindero S,Teh Y W.A Fast Learning Algorithm for Deep Belief Nets{J}. Neural Computation,2006, 18(7):1527--1554.
[8]
Hinton G E.Training Products of Experts by Minimizing Contrastive Divergence{J}. Neural Computation,2002,14(8):1771--1800.
[9]
Hinton G E.A practical guide to training restricted Boltzmann machines{J}. Momentum,2010,9(1):926.
[10]
Rumehart D E,Hinton G E,Williams R J.Learning representations by back-propagating errors{J}. Nature,1986,323(6088):533--536.
[11]
NSL-KDD dataset,http://nsl.cs.unb.ca/NSL-KDD/.
[12]
LIN C J.Formulations of Support Vector Machines:A Note from an Optimization Point of View{J}. Neural Computation,2001,13(2):307--317

Cited By

View all

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
ICNCC '17: Proceedings of the 2017 VI International Conference on Network, Communication and Computing
December 2017
265 pages
ISBN:9781450353663
DOI:10.1145/3171592
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 08 December 2017

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. deep belief network
  2. deep learning
  3. intrusion detection

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Conference

ICNCC 2017

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)8
  • Downloads (Last 6 weeks)2
Reflects downloads up to 03 Feb 2025

Other Metrics

Citations

Cited By

View all

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media