Preprint Article Version 1 Preserved in Portico This version is not peer-reviewed

Genetic Algorithm-based Optimal Deep Neural Network for Detecting Network Intrusions

Version 1 : Received: 27 January 2022 / Approved: 31 January 2022 / Online: 31 January 2022 (13:26:18 CET)

How to cite: Adhikary, S.; Anwar, M.M.; Morshed Chowdhury, M.J.; H. Sarker, I. Genetic Algorithm-based Optimal Deep Neural Network for Detecting Network Intrusions. Preprints 2022, 2022010465 (doi: 10.20944/preprints202201.0465.v1). Adhikary, S.; Anwar, M.M.; Morshed Chowdhury, M.J.; H. Sarker, I. Genetic Algorithm-based Optimal Deep Neural Network for Detecting Network Intrusions. Preprints 2022, 2022010465 (doi: 10.20944/preprints202201.0465.v1).

Abstract

Computer network attacks are evolving in parallel with the evolution of hardware and neural network architecture. Despite major advancements in Network Intrusion Detection System (NIDS) technology, most implementations still depend on signature-based intrusion detection systems, which can’t identify unknown attacks. Deep learning can help NIDS to detect novel threats since it has a strong generalization ability. The deep neural network’s architecture has a significant impact on the model’s results. We propose a genetic algorithm based model to find the optimal number of hidden layers and the number of neurons in each layer of the deep neural network (DNN) architecture for the network intrusion detection binary classification problem. Experimental results demonstrate that the proposed DNN architecture shows better performance than classical machine learning algorithms at a lower computational cost.

Keywords

genetic algorithm; deep neural network; hidden layer; optimal architecture; intrusion detection

Subject

MATHEMATICS & COMPUTER SCIENCE, Artificial Intelligence & Robotics

Comments (0)

We encourage comments and feedback from a broad range of readers. See criteria for comments and our diversity statement.

Leave a public comment
Send a private comment to the author(s)
Views 0
Downloads 0
Comments 0
Metrics 0


×
Alerts
Notify me about updates to this article or when a peer-reviewed version is published.
We use cookies on our website to ensure you get the best experience.
Read more about our cookies here.