UDK 519.6
COMPUTER SECURITY PROBLEMS SOLVING BY AUTOMATICALLY DESIGNED NEURAL NETWORK ENSEMBLES
M. E. Semenkina, E. A. Popov
Siberian State Aerospace University named after academician M. F. Reshetnev 31, Krasnoyarsky Rabochy Av., Krasnoyarsk, 660014, Russian Federation Е-mail: semenkina88@mail.ru, epopov@bmail.ru
Today, computers are becoming more powerful and interconnected that makes their security one of the most important concerns. Conventional security software requires a lot of human effort to identify and work out threats. This human labor intensive process can be more efficient by applying machine learning algorithms. Artificial neural networks are one of the most widely used data mining techniques here. The highly increasing computing power and technology made possible the use of more complex intelligent architectures, taking advantage of more than one intelligent system in a collaborative way. This is an effective combination of intelligent techniques that outperforms or competes to simple standard intelligent techniques. One of the hybridization forms, the ensemble technique, has been applied in many real world problems. In this paper, artificial neural networks based ensembles are used for solving the computer security problems. We apply the self-configuring genetic programming technique to construct symbolic regression formula that shows how to compute an ensemble decision using the component ANN decisions. The algorithm involves different operations and math functions and uses the models providing the diversity among the ensemble members. Namely, we use neural networks, automatically designed with our GP algorithm, as the ensemble members. The algorithm automatically chooses component ANNs which are important for obtaining an efficient solution and doesn’t use the others. Performance of the approach is demonstrated with test problems and then applied to two real world problems from the field of computer security – intrusion and spam detection. The proposed approach demonstrates results competitive to known techniques. With the approach developed an end user has no necessity to be an expert in the computational intelligence area but can implement the reliable and effective data mining tool.
evolutionary algorithms, self-configuration, artificial neural networks, ensemble, automated design, spam and intrusion detection
References
  1.  Maloof M. (ed.) Machine Learning and Data Mining for Computer Security. Springer. 2006.
  2. Victoire T. A., Sakthivel M. A Refined Differential Evolution Algorithm Based Fuzzy Classifier for Intrusion Detection. European Journal of Scientific Research, 2011, vol. 65, no. 2, p. 246–259.
  3. Bloedorn E. E., Talbot L. M., DeBarr D. D. Data Mining Applied to Intrusion Detection: MITRE Experiences. Machine Learning and Data Mining for Computer Security: Methods and Applications. London: Springer, 2006
  4. Julisch K. Intrusion Detection Alarm Clustering. Machine Learning and Data Mining for Computer Security Methods and Applications. London, Springer, 2006.
  5. Patcha A., Park J.-M. An Overview of Anomaly Detection Techniques: Existing Solutions and Latest Technological Trends. Computer Networks, 2007.
  6. Özgür L., Güngör T., Gürgen F. Spam Mail Detection Using Artificial Neural Network and Bayesian Filter. Intelligent Data Engineering and Automated Learning – IDEAL 2004. Lecture Notes in Computer Science, 2004, vol. 3177, p. 505–510.
  7. Han C., Li Y., Yang D., Hao Y. An intrusion detection system based on neural networkProceedings of Mechatronic Science, Electric Engineering and Computer (MEC), 2011, p. 2018–2021.
  8. Saravanakumar S., Mohanaprakash T. A., Dharani R., Kumar C. J. Analysis of ANN-based Echo State Network Intrusion Detection in Computer Networks. International Journal of Computer Science and Telecommunications, 2012, vol. 3, no. 4, p. 8–13.
  9. Panda M., Abraham A., Das S., Patra M. R. Network intrusion detection system: A machine learning approach. Intelligent Decision Technologies, 2011,  vol. 5(4), p. 347–356.
  10. Pervez S., Ahmad I., Akram A., Swati S. U. A Comparative Analysis of Artificial Neural Network Technologies in Intrusion Detection Systems. Proceedings of the 6th WSEAS International Conference on Multimedia, Internet & Video Technologies, 2006, p. 84–89.
  11. Dietterich T. G. An experimental comparison of three methods for constructing ensembles of decision trees: bagging, boosting, and randomization. Machine Learning, 2000, vol. 40, no. 2, p. 139–158.
  12. Ho T. K., Hull J. J., Srihari S. N. Decision combination in multiple classifier systems. IEEE Transactions on Pattern Analysis and Machine Intelligence, 1994, vol. 16, no. 1, p. 66–75.
  13. Breiman L. Bagging predictors. Machine Learning, 1996, vol. 24 (2), p. 123–140.
  14. Friedman J. H., Hastie T., Tibshirani R. Additive logistic regression: a statistical view of boosting. Annals of Statistics, 2000, vol. 28, no. 2, p. 337–374.
  15. Navone H. D., Granitto P. M., Verdes P. F., Ceccatto H.A. A learning algorithm for neural network ensembles. Inteligencia Artificial, Revista Iberoamericana de Inteligencia Artificial, 2001, no. 12, p. 70–74.
  16. Johansson U., Lofstrom T., Konig R., Niklasson L. Building Neural Network Ensembles using Genetic Programming. International Joint Conference on Neural Networks. 2006.
  17. Poli R., Langdon W. B., McPhee N. F. A Field Guide to Genetic Programming. Available at: http://www. gp-field-guide.org.uk.
  18. Bukhtoyarov V., Semenkina O. Comprehensive evolutionary approach for neural network ensemble automatic design. Proceedings of the IEEE World Congress on Computational Intelligence, 2010, p. 1640–1645.
  19. Gomez J. Self-Adaptation of Operator Rates in Evolutionary Algorithms. GECCO 2004, LNCS, 2004, vol. 3102, p. 1162–1173.
  20. Meyer-Nieberg S., Beyer H.-G. Self-Adaptation in Evolutionary Algorithms. Parameter Setting in Evolutionary Algorithm, 2007, p. 47–75.
  21. O’Neill M., Vanneschi L., Gustafson S., Banzhaf W. Open issues in genetic programming. Genetic Programming and Evolvable Machines, 2010, vol. 11, p. 339–363.
  22. Finck S., et al. Real-parameter black-box optimization benchmarking 2009. Presentation of the noiseless functions. Technical Report Researh Center PPE. 2009.
  23. Semenkin E., Semenkina M. Self-configuring genetic programming algorithm with modified uniform crossover. IEEE Congress on Evolutionary Computation (CEC’2012), 2012, p. 1918–1923.
  24. Semenkin E., Semenkina M. Self-Configuring Genetic Algorithm with Modified Uniform Crossover Operator. ICSI 2012. LNCS, 2012, vol. 7331, part 1, p. 414–421.
  25. Frank A., Asuncion A. UCI Machine Learning Repository. Available at: http://archive.ics.uci.edu/ml. Irvine, CA: University of California, School of Information and Computer Science, 2010.
  26. Yu J. J. Q., Lam A. Y. S., Li V. O. K. Evolutionary Artificial Neural Network Based on Chemical Reaction Optimization. IEEE Congress on Evolutionary Computation (CEC'2011). 2011.
  27. Bukhtoyarov V., Semenkin E., Shabalov A. Neural Networks Ensembles Approach for Simulation of Solar Arrays Degradation Process. Hybrid Artificial Intelligent Systems. Lecture Notes in Computer Science, 2012, vol. 7208, p. 186–195.
  28. Stolfo S., Fan W., Lee W., Prodromidis A.,
  29. Chan P. Cost-based Modelling for Fraud and Intrusion Detection: Results from the JAM Project. Proceedings of the 2000 DARPA Information Survivability Conference and Exposition (DISCEX '00). 2000.
  30. Malik A. J., Shahzad W., Khan F. A.: Binary PSO and random forests algorithm for PROBE attacks detection in a network. IEEE Congress on Evolutionary Computation, 2011, p. 662–668.
  31. 30. Dimitrakakis C., Bengio S. Online Policy Adaptation for Ensemble Classifiers. IDIAP Research Report 03-69. 2006.

Semenkina Maria Evgenyevna – Cand. Sc., Docent of the Higher Mathematics Department, Siberian State Aerospace University named after academician M. F. Reshetnev. E-mail: semenkina88@mail.ru

Popov Evgeny Aleksandrovich – Dr. Sc., Professor of System analysis and operations research department, Siberian State Aerospace University named after academician M. F. Reshetnev. E-mail: epopov@bmail.ru