Network Intrusion Detection for Cyber Security on Neuromorphic Computing System
Title | Network Intrusion Detection for Cyber Security on Neuromorphic Computing System |
Publication Type | Conference Paper |
Year of Publication | 2017 |
Authors | Alom, M. Z., Taha, T. M. |
Conference Name | 2017 International Joint Conference on Neural Networks (IJCNN) |
Date Published | may |
Publisher | IEEE |
ISBN Number | 978-1-5090-6182-2 |
Keywords | Artificial neural networks, auto encoder, Biological neural networks, Cognitive Computing, computer security, crossbar weight, cyber security, Deep Neural Network, discrete values, discrete vector factorization, DVF, hybrid encoding, IBM neurosynaptic core simulator, IBM TrueNorth neurosynaptic chip, IDS, Intrusion detection, learning (artificial intelligence), machine learning, Matrix decomposition, Metrics, network intrusion detection, Network security, neural chips, Neural networks, neuromorphic cognitive computing, neuromorphic computing, neuromorphic computing system, Neuromorphics, Neurons, NSCS, physical neuromorphic chip, policy-based governance, power efficient neuromorphic processors, pubcrawl, resilience, Resiliency, security of data, synaptic weights, Training, TrueNorth System, unsupervised deep learning |
Abstract | In the paper, we demonstrate a neuromorphic cognitive computing approach for Network Intrusion Detection System (IDS) for cyber security using Deep Learning (DL). The algorithmic power of DL has been merged with fast and extremely power efficient neuromorphic processors for cyber security. In this implementation, the data has been numerical encoded to train with un-supervised deep learning techniques called Auto Encoder (AE) in the training phase. The generated weights of AE are used as initial weights for the supervised training phase using neural networks. The final weights are converted to discrete values using Discrete Vector Factorization (DVF) for generating crossbar weight, synaptic weights, and thresholds for neurons. Finally, the generated crossbar weights, synaptic weights, threshold, and leak values are mapped to crossbars and neurons. In the testing phase, the encoded test samples are converted to spiking form by using hybrid encoding technique. The model has been deployed and tested on the IBM Neurosynaptic Core Simulator (NSCS) and on actual IBM TrueNorth neurosynaptic chip. The experimental results show around 90.12% accuracy for network intrusion detection for cyber security on the physical neuromorphic chip. Furthermore, we have investigated the proposed system not only for detection of malicious packets but also for classifying specific types of attacks and achieved 81.31% recognition accuracy. The neuromorphic implementation provides incredible detection and classification accuracy for network intrusion detection with extremely low power. |
URL | http://ieeexplore.ieee.org/document/7966339/ |
DOI | 10.1109/IJCNN.2017.7966339 |
Citation Key | alom_network_2017 |
- policy-based governance
- network security
- neural chips
- Neural networks
- neuromorphic cognitive computing
- neuromorphic computing
- neuromorphic computing system
- Neuromorphics
- Neurons
- NSCS
- physical neuromorphic chip
- network intrusion detection
- power efficient neuromorphic processors
- pubcrawl
- resilience
- Resiliency
- security of data
- synaptic weights
- Training
- TrueNorth System
- unsupervised deep learning
- DVF
- auto encoder
- Biological neural networks
- Cognitive Computing
- computer security
- crossbar weight
- cyber security
- Deep Neural Network
- discrete values
- discrete vector factorization
- Artificial Neural Networks
- hybrid encoding
- IBM neurosynaptic core simulator
- IBM TrueNorth neurosynaptic chip
- IDS
- Intrusion Detection
- learning (artificial intelligence)
- machine learning
- Matrix decomposition
- Metrics