
ARTIFICIAL NEURAL NETWORK ANALYSIS OF SOME SELECTED KDD CUP 99 DATASET FOR INTRUSION DETECTION Abstract: Due to the growing number of intrusions in local networks and the internet, it has become so universal that institution increasingly implements many structures that investigate information technology security violations. This study aimed to process, classify and predict the intrusion detection accuracy of some selected network attacks using the artificial neural network (ANN) technique. Five important attacks, namely; Buffer overflow, Denial of Service (DoS), User to Root Attack (U2R), Remote to Local Attack (R2L) and PROBE were chosen from the KDD CUPP’99 information and intrusion identification accuracy was investigated with artificial neural network (ANN) modeling technique. Findings from the classification show that out of the procedures utilized to establish the ANN model, 27262 of the 45528 buffer overflow are classified appropriately, 7903 of the 45528 DoS attacks are arranged appropriately, 1371 of the 45528 U2R are classified appropriately, 431 of the 45528 R2L are arranged appropriately and, 8304 of the 45528 PROBE are classified appropriately. Comprehensively, about 99.1% of the training proceedings are arranged properly, equivalent to 0.9% erroneous classification while the testing specimen assisted to confirm the model with99.1% of the attacks were appropriately arranged by the ANN equation. This support that, comprehensively, the ANN equation is precise about the classification and prediction of the five attacks investigated in this study
Samuel Olorunfemi Adams (),
Ednah Azikwe and
Mohammed Anono Zubair
Additional contact information
Samuel Olorunfemi Adams: Department of Statistics, University of Abuja, Abuja, Nigeria
Ednah Azikwe: Department of Computer Science, Captain Elechi Amadi Polytechnic Port-Harcourt, River State, Nigeria
Mohammed Anono Zubair: Department of Statistics, University of Abuja, Abuja, Nigeria
Acta Informatica Malaysia (AIM), 2022, vol. 6, issue 2, 55-61
Keywords: Network Attacks; Intrusion detection system; Multilayer perception; Neural Network; Neuron; predictors. (search for similar items in EconPapers)
Date: 2022
References: View complete reference list from CitEc
Citations:
Downloads: (external link)
https://actainformaticamalaysia.com/archives/AIM/2aim2022/2aim2022-55-61.pdf (application/pdf)
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:zib:zbnaim:v:6:y:2022:i:2:p:55-61
DOI: 10.26480/aim.02.2022.55.61
Access Statistics for this article
Acta Informatica Malaysia (AIM) is currently edited by Associate Professor Dr. Shahreen Kasim
More articles in Acta Informatica Malaysia (AIM) from Zibeline International Publishing
Bibliographic data for series maintained by Zibeline International Publishing ( this e-mail address is bad, please contact ).