EconPapers    
Economics at your fingertips  
 

ARTIFICIAL NEURAL NETWORK ANALYSIS OF SOME SELECTED KDD CUP 99 DATASET FOR INTRUSION DETECTION Abstract: Due to the growing number of intrusions in local networks and the internet, it has become so universal that institution increasingly implements many structures that investigate information technology security violations. This study aimed to process, classify and predict the intrusion detection accuracy of some selected network attacks using the artificial neural network (ANN) technique. Five important attacks, namely; Buffer overflow, Denial of Service (DoS), User to Root Attack (U2R), Remote to Local Attack (R2L) and PROBE were chosen from the KDD CUPP’99 information and intrusion identification accuracy was investigated with artificial neural network (ANN) modeling technique. Findings from the classification show that out of the procedures utilized to establish the ANN model, 27262 of the 45528 buffer overflow are classified appropriately, 7903 of the 45528 DoS attacks are arranged appropriately, 1371 of the 45528 U2R are classified appropriately, 431 of the 45528 R2L are arranged appropriately and, 8304 of the 45528 PROBE are classified appropriately. Comprehensively, about 99.1% of the training proceedings are arranged properly, equivalent to 0.9% erroneous classification while the testing specimen assisted to confirm the model with99.1% of the attacks were appropriately arranged by the ANN equation. This support that, comprehensively, the ANN equation is precise about the classification and prediction of the five attacks investigated in this study

Samuel Olorunfemi Adams (), Ednah Azikwe and Mohammed Anono Zubair
Additional contact information
Samuel Olorunfemi Adams: Department of Statistics, University of Abuja, Abuja, Nigeria
Ednah Azikwe: Department of Computer Science, Captain Elechi Amadi Polytechnic Port-Harcourt, River State, Nigeria
Mohammed Anono Zubair: Department of Statistics, University of Abuja, Abuja, Nigeria

Acta Informatica Malaysia (AIM), 2022, vol. 6, issue 2, 55-61

Keywords: Network Attacks; Intrusion detection system; Multilayer perception; Neural Network; Neuron; predictors. (search for similar items in EconPapers)
Date: 2022
References: View complete reference list from CitEc
Citations:

Downloads: (external link)
https://actainformaticamalaysia.com/archives/AIM/2aim2022/2aim2022-55-61.pdf (application/pdf)

Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.

Export reference: BibTeX RIS (EndNote, ProCite, RefMan) HTML/Text

Persistent link: https://EconPapers.repec.org/RePEc:zib:zbnaim:v:6:y:2022:i:2:p:55-61

DOI: 10.26480/aim.02.2022.55.61

Access Statistics for this article

Acta Informatica Malaysia (AIM) is currently edited by Associate Professor Dr. Shahreen Kasim

More articles in Acta Informatica Malaysia (AIM) from Zibeline International Publishing
Bibliographic data for series maintained by Zibeline International Publishing ( this e-mail address is bad, please contact ).

 
Page updated 2025-03-20
Handle: RePEc:zib:zbnaim:v:6:y:2022:i:2:p:55-61