+ All Categories
Home > Documents > A Hybrid System of Deep Learning and Learning Classifier...

A Hybrid System of Deep Learning and Learning Classifier...

Date post: 07-Jun-2020
Category:
Upload: others
View: 6 times
Download: 0 times
Share this document with a friend
11
A Hybrid System of Deep Learning and Learning Classier System for Database Intrusion Detection Seok-Jun Bu and Sung-Bae Cho (&) Department of Computer Science, Yonsei University, Seoul, South Korea {sjbuhan,sbcho}@yonsei.ac.kr Abstract. Nowadays, as most of the companies and organizations rely on the database to safeguard sensitive data, it is required to guarantee the strong pro- tection of the data. Intrusion detection system (IDS) can be an important component of the strong security framework, and the machine learning approach with adaptation capability has a great advantage for this system. In this paper, we propose a hybrid system of convolutional neural network (CNN) and learning classier system (LCS) for IDS, called Convolutional Neural-Learning Classier System (CN-LCS). CNN, one of the deep learning methods for image and pattern classication, classies the queries by modeling normal behaviors of database. LCS, one of the adapted heuristic search algorithms based on genetic algorithm, discovers new rules to detect abnormal behaviors to supplement the CNN. Experiments with TPC-E benchmark database show that CN-LCS yields the best classication accuracy compared to other state-of-the-art machine learning algorithms. Additional analysis by t-SNE algorithm reveals the com- mon patterns among highly misclassied queries. 1 Introduction Relational database management system (RDBMS) has been used for the high per- formance data storage. Many companies and organizations depend upon the database to safeguard sensitive data [1]. Because the value of some of these data is worth millions, it is necessary to guarantee the strong protection of the data. An important component of a strong security framework able to protect sensitive data in database is an intrusion detection system (IDS) [2]. The attacks on RDBMS can be categorized in insider and outsider attacks. Outsider attacks, such as SQL-injection, can be usually mitigated by defensive programming techniques; insider threats, however, are much more dif cult to detect and are poten- tially more dangerous [3, 4]. The IDS proposed so far seems insuf cient to detect and handle a class of intrusion, especially insider attack, since these solutions lack the learning and adaptation capabilities [5]. In particular, 0-day attacks (attacks that pre- viously unseen) may cause a major security hole in IDS. With the capability of adaptation, the machine learning approach can address the issue. The state-of-the-art method used random forest algorithm to generalize and classify the role of each query [6]. The method models the pattern of authorized queries © Springer International Publishing AG 2017 F.J. Martínez de Pisón et al. (Eds.): HAIS 2017, LNAI 10334, pp. 615625, 2017. DOI: 10.1007/978-3-319-59650-1_52
Transcript
Page 1: A Hybrid System of Deep Learning and Learning Classifier ...sclab.yonsei.ac.kr/publications/Papers/IC/2017_HAIS_SJB.pdf · A Hybrid System of Deep Learning and Learning Classifier

A Hybrid System of Deep Learningand Learning Classifier Systemfor Database Intrusion Detection

Seok-Jun Bu and Sung-Bae Cho(&)

Department of Computer Science, Yonsei University, Seoul, South Korea{sjbuhan,sbcho}@yonsei.ac.kr

Abstract. Nowadays, as most of the companies and organizations rely on thedatabase to safeguard sensitive data, it is required to guarantee the strong pro-tection of the data. Intrusion detection system (IDS) can be an importantcomponent of the strong security framework, and the machine learning approachwith adaptation capability has a great advantage for this system. In this paper,we propose a hybrid system of convolutional neural network (CNN) andlearning classifier system (LCS) for IDS, called Convolutional Neural-LearningClassifier System (CN-LCS). CNN, one of the deep learning methods for imageand pattern classification, classifies the queries by modeling normal behaviors ofdatabase. LCS, one of the adapted heuristic search algorithms based on geneticalgorithm, discovers new rules to detect abnormal behaviors to supplement theCNN. Experiments with TPC-E benchmark database show that CN-LCS yieldsthe best classification accuracy compared to other state-of-the-art machinelearning algorithms. Additional analysis by t-SNE algorithm reveals the com-mon patterns among highly misclassified queries.

1 Introduction

Relational database management system (RDBMS) has been used for the high per-formance data storage. Many companies and organizations depend upon the database tosafeguard sensitive data [1]. Because the value of some of these data is worth millions,it is necessary to guarantee the strong protection of the data. An important componentof a strong security framework able to protect sensitive data in database is an intrusiondetection system (IDS) [2].

The attacks on RDBMS can be categorized in insider and outsider attacks. Outsiderattacks, such as SQL-injection, can be usually mitigated by defensive programmingtechniques; insider threats, however, are much more difficult to detect and are poten-tially more dangerous [3, 4]. The IDS proposed so far seems insufficient to detect andhandle a class of intrusion, especially insider attack, since these solutions lack thelearning and adaptation capabilities [5]. In particular, 0-day attacks (attacks that pre-viously unseen) may cause a major security hole in IDS.

With the capability of adaptation, the machine learning approach can address theissue. The state-of-the-art method used random forest algorithm to generalize andclassify the role of each query [6]. The method models the pattern of authorized queries

© Springer International Publishing AG 2017F.J. Martínez de Pisón et al. (Eds.): HAIS 2017, LNAI 10334, pp. 615–625, 2017.DOI: 10.1007/978-3-319-59650-1_52

Page 2: A Hybrid System of Deep Learning and Learning Classifier ...sclab.yonsei.ac.kr/publications/Papers/IC/2017_HAIS_SJB.pdf · A Hybrid System of Deep Learning and Learning Classifier

and classifies a new query according to each role, but the information loss in dimensionreduction left a room to improve the intrusion detection performance.

In this paper, we propose a hybrid system, called Convolutional Neural-LearningClassifier System (CN-LCS), for IDS composed of convolutional neural network(CNN) and learning classifier system (LCS). Different from Dam’s work [7], we exploita deep learning method of CNN. CN-LCS can classify sparse and high-dimensionalfeature vectors of queries from database using automatic feature selection ability fromgenetic algorithm and convolution-pooling operations. Convolutional neural network,one of the deep learning methods for image and pattern classification [8], is used formodeling normal behaviors of database queries. Experiments with TPC-E benchmarkdatabase will show the superiority of the CN-LCS compared to other state-of-the-artmachine learning algorithms.

The rest of the paper is organized as follows. Section 2 discusses the related worksand Sect. 3 describes the proposed CN-LCS architecture in detail. Section 4 presentsthe results from experiments on role-based access control (RBAC) model from TPC-Ebenchmark database. In addition, some analyses by t-SNE algorithm reveal the generalpatterns among misclassified queries.

2 Related Works

A lot of research works have been developed in IDS domain. In this section, weintroduce various research works based on machine learning approach to compare withthe proposed CN-LCS. Most of the methods before the year of 2000 were proposedwithout machine learning algorithms. Lee et al. proposed signature-based approachbased on predefined blacklist of queries [1]. Hu et al. used classification rules with therationale that an item update does not happen alone and is accompanied by a set ofother events recorded in the database log [9]. A data dependency miner was designedfor mining data correlations, and a sinuous IDS was developed as a result.

On the other hand, IDS using machine learning approach is gaining more and moreattention in the field of database anomaly detection because of the high detectionaccuracy, efficiency, and automation features [10]. Barbara et al. used hidden Markovmodel (HMM) to capture the change in database’s normal behavior over time [11].Several machine learning algorithms have been adopted in IDS since 2005. Valeuret al. used Bayesian model to detect anomalous queries and showed almost 0% falsepositive rate on manually created attacks [12]. Ramasubramanian et al. used artificialneural network (ANN) to model the behaviors of misuse-based intrusion [13]. Theyshowed that database behaviors can be modeled successfully using machine learningalgorithms.

Kamra et al. used naive Bayes classifier to classify anomalous queries withoutfeature selection [14]. Also, support vector machine (SVM) and multi-layered Per-ceptron (MLP) were adopted to detect SQL-injection attacks [5, 15]. Ronao et al. useda combination of principal component analysis (PCA) and random forest (RF) for thetask of query feature selection and database anomaly detection [2]. PCA produced acompact and meaningful set of features from queries and RF achieved a relatively goodperformance. Table 1 shows the summary of these methods.

616 S.-J. Bu and S.-B. Cho

Page 3: A Hybrid System of Deep Learning and Learning Classifier ...sclab.yonsei.ac.kr/publications/Papers/IC/2017_HAIS_SJB.pdf · A Hybrid System of Deep Learning and Learning Classifier

3 The Proposed System

In this section, we present the architecture of CN-LCS and the two main components:rule discovery component to select and filter out features from queries based onlearning classifier system, and the intrusion detection component to classify the role ofeach query based on convolutional neural network.

3.1 System Overview

Role-based access control (RBAC) is essential to database security. RBAC provides amethodology for regulating an individual user’s query to database based on her role.

Table 1. Related works for the IDS using machine learning algorithms

Authors Methods Description

Barbara [11] Hidden markov model Create an HMM for each clusterValeur [12] Bayesian model SQL grammar generalizationRamasubramanian [13] Artificial neural network,

genetic algorithmGA used to speed-up the trainingprocess of ANN

Kamra [14] Naive bayes Take into account imbalancedSQL query access

Pinzon et al. [5, 15] Support vector machine Agent-based intrusion detectionRonao [2] Principal component

analysis, random forestPCA is performed before RF

Fig. 1. System architecture of the proposed IDS of CN-LCS

A Hybrid System of Deep Learning and Learning Classifier System 617

Page 4: A Hybrid System of Deep Learning and Learning Classifier ...sclab.yonsei.ac.kr/publications/Papers/IC/2017_HAIS_SJB.pdf · A Hybrid System of Deep Learning and Learning Classifier

The IDS based on RBAC profiles is considered as a standard classification problem [2].Figure 1 shows the proposed CN-LCS architecture.

During the training phase in Fig. 2, n queries collected from database log with itsown role are fed to environment and the features are extracted to form feature vectorF ¼ x1; y1ð Þ; . . .; xn; ynð Þ. Since the features extracted form fairly sparce vectors, theyshould be selected before the classifier is learnt [16]. The discovery component has thekey part in feature selection using LCS. p chromosomes encoded in generation G½ � arepartial solutions to the overall feature selection task. Each chromosome consists of asimple rule that forms 1-dimensional array of binary code (0, 1) in the length offeatures. The element of rule decides if the corresponding element in feature vector willbe used in input, or filtered as 0. The selected features are then fed into CNN, where theconvolution and pooling operations are done to distort the given pattern of normalbehavior of queries, and extract the representative values from it. The model usingconvolution and pooling operations is mainly used for image classification andachieved the highest accuracy in various competitions [17, 18]. The accuracy of eachtrial on chromosome is considered as fitness, and genetic operations are applied to getbetter partial solution for feature selection.

During the detection phase, the model with the corresponding chromosome whichachieved the highest fitness is selected. Features are extracted for a newly arrived queryand selected according to the fitness. The trained CNN classifies if the query is

Fig. 2. Training algorithm for CN-LCS

618 S.-J. Bu and S.-B. Cho

Page 5: A Hybrid System of Deep Learning and Learning Classifier ...sclab.yonsei.ac.kr/publications/Papers/IC/2017_HAIS_SJB.pdf · A Hybrid System of Deep Learning and Learning Classifier

anomalous, so that the response engine alarms to administrator and drops the query.Otherwise, it is executed in database.

3.2 Rule Discovery by Learning Classifier System

The main purpose of genetic algorithm used in rule discovery component is filter outnoise from each training data instance. The multiple criteria to be optimized include theaccuracy of classification, cost and risk associated with classification which in turndepends on the selection of features used to describe the patterns [19]. Given featurevectors F ¼ x1; y1ð Þ; . . .; xn; ynð Þ; xi from instance i is the feature extracted from aquery. The binary-encoded chromosomes carrying schema H decide whether the fea-ture from feature vector instance xi is used or not. Given the probabilities of crossoverpc and mutation pm, the probability of disruption p is calculated as follows:

p ¼ d Hð Þl� 1

pc þ o Hð Þpm ð1Þ

where d Hð Þ is the defining length and o Hð Þ is the order of a schema, and l is the lengthof the chromosome. The short, low-order schema with above-average fitness increasesexponentially, given by:

m H; tþ 1ð Þ� m H; tð Þf Hð Þat

1� p½ � ð2Þ

where m H; tð Þ is the number of strings belonging to scheme H at generation t, f Hð Þ isthe observed average fitness of schema H and at is the observed average fitness atgeneration t [20].

Each encoded chromosome carrying schema is a partial solution of automatedfeature selection and can be a supplementation to the following classifier. Gradientbased learning algorithms mathematically well-founded for unimodal search spaces canget caught in local minima of the error function [19]. The features F extracted manuallyfrom database log often form a noisy or irrelevant vector of features. The learningalgorithm used gets slow down significantly due to the large number of dimensions ofthe noisy feature space, and also produces lower classification accuracy due to learningirrelevant information [21].

3.3 Intrusion Detection by Convolutional Neural Network

While noise from the training instance xi is filtered out from discovery component ofCN-LCS, the large length of the xi is still problematic. In order to handle data in a highdimensionality, we need to reduce the dimensionality [22].

Convolution and pooling operations, which can be used to reduce spectral varia-tions and model spectral correlations that exist in patterns, are used for the task [23].

A Hybrid System of Deep Learning and Learning Classifier System 619

Page 6: A Hybrid System of Deep Learning and Learning Classifier ...sclab.yonsei.ac.kr/publications/Papers/IC/2017_HAIS_SJB.pdf · A Hybrid System of Deep Learning and Learning Classifier

Given feature vector xi; yið Þ, the output clxy from the lth convolutional layer per-

forms the convolution operation with yl�1 which froms the l� 1 st layer using m�mfilter w:

clxy ¼Xm�1

a¼0

Xm�1

b¼0waby

l�1xþ að Þ yþ bð Þ ð3Þ

The summary statistic of nearby outputs is derived from cl�1 by max-poolingoperation. The output plxy from the lth pooling layer performs the max-pooling oper-ation with k� k area in N� N output vector, where T is pooling stride:

plxy ¼ maxcl�1xy�T ð4Þ

Several convolutional and pooling layers can be stacked on top of the another toform a deep neural network architecture, and the proposed CN-LCS uses two pairs ofconvolution and pooling layers to prevent the model from overfiting in training datasetor degradation problem [24].

Distorted and pooled features from stacked convolutional and pooling layers areflattened to form feature vectors pl ¼ p1; . . .; pI½ �, where I is the number of units in thelast pooling layer, as input to the fully-connected layer:

hli ¼X

j

wl�1ji r pl�1

i

� �þ bi� � ð5Þ

where wl�1ji is weight between the ith node from l� 1st st layer and the jth node from

the lth layer, r is the activation function used in the layer, and bi is the bias term.The output of the last layer, the softmax layer, is the inferred query role yi where R

is the total number of roles, and L is the last layer index:

p yijxið Þ ¼ argmaxexp pL�1wL þ bLð ÞPR

k¼1 exp pL�1wkð Þ ð6Þ

Network weight update and error cost minimization are done by backpropagationalgorithm to xi, and mapped with yi after forward propagation is performed usingEqs. (3)–(6).

The CNN classifier is implemented as thirty-two 2� 2 convolution filters and2� 2 pooling, and 128-64-11 nodes for fully-connected layer, from bottom-to-top, tobuild shallow but practical size of network.

4 Experimental Results

In this section, we explain the dataset and experimental environments. We also showhow CN-LCS performs in accordance with generations, and compare with othermachine learning methods. For the fairness of evaluation, 10-fold cross validation wasconducted.

620 S.-J. Bu and S.-B. Cho

Page 7: A Hybrid System of Deep Learning and Learning Classifier ...sclab.yonsei.ac.kr/publications/Papers/IC/2017_HAIS_SJB.pdf · A Hybrid System of Deep Learning and Learning Classifier

4.1 Environments

The schema and standard transactions of the TPC-E benchmark database were used forthe experiments. 11 read-only and read/write transactions were treated as roles, as if itwere obtained from an RBAC model. We generated 1,000 normal queries for each role,with a total of 11,000 queries for each of our training dataset. The accuracy of clas-sifying anomalous queries increases in proportion to the performance of classifyingnormal queries.

The generated queries parsed as query clause are separated, such as projectionclause, selection attribute clause, and others, line-by-line. From these parsed queries,we extracted query features, represented by the vector. Counting features, which arefeatures that count the presence of an element in a query clause, and ID features, whichdenote the position of an element in the query clause, are extracted from a parsedqueries [6]. All features use the decimal encoding scheme for their final values.

A total of 277 features were extracted given the TPC-E schema. Since the nearestfull squares is 289, 12 features were padded as 0 to each instance xi and reshaped in17� 17 2-dimensional pattern as shown in Fig. 3. Experimental results showed2D-CNN converges faster than 1D-CNN. It is advantageous to reduce the number ofiterations even a little, though the final classification performance was similar, sinceCN-LCS algorithms create a large number of CNN’s in proportion to the size ofpopulation per generation.

The proposed CN-LCS is implemented with Tensorflow that is a very efficientlibrary for matrix multiplication using GPU [25]. We used four NVIDIA GTX1080 torun a large number of CNN’s trained with the CN-LCs algorithm.

4.2 Results and Analysis

The best and average classification accuracies per generation are shown in Fig. 4.30 generations were tested and each of generation consists of 50 populations, thereby1500 CNN’s were created.

As the generation went by, overall accuracy of classification increased, whereasslight performance degradation was occurred in generations 20 to 25. This may beattributed to the accidental disruption of schema occurred due to genetic operation. Thebest model achieved in generation 28, resulting in the test accuracy of 94.64%.

Fig. 3. Visualization of feature vectors from queries

A Hybrid System of Deep Learning and Learning Classifier System 621

Page 8: A Hybrid System of Deep Learning and Learning Classifier ...sclab.yonsei.ac.kr/publications/Papers/IC/2017_HAIS_SJB.pdf · A Hybrid System of Deep Learning and Learning Classifier

Figure 5 is the boxplot with other classification methods after 10-fold cross vali-dation. The proposed CN-LCS achieved the highest accuracy and MLP has the lowestaccuracy. We also replaced the CNN in CN-LCS with a shallow MLP, with 128-64-11nodes bottom-to-top, to compare with our model. It is observed that the MLP adoptedto the CN-LCS algorithm immediately improved.

Figure 6 shows the confusion matrix of classification from model which achievedthe test accuracy of 93.36%, indicating a similar accuracy with 10-fold cross validationaverage. Notice that classes 0 to 5 are read-only roles (SELECT commands only) and

Fig. 4. The best and average accuracies (fitness) per generation

Fig. 5. Comparison of 10-cross validation accuracy with other classifiers

622 S.-J. Bu and S.-B. Cho

Page 9: A Hybrid System of Deep Learning and Learning Classifier ...sclab.yonsei.ac.kr/publications/Papers/IC/2017_HAIS_SJB.pdf · A Hybrid System of Deep Learning and Learning Classifier

the remaining is read/write roles. Among read/write roles, classes 6 and 10 were highlyconfused with each other. We noticed that both roles include SELECT and INSERTcommands. This confusion is caused by overlapping between the two roles; INSERTcommands are commonly associated with a SELECT command.

Figure 7 shows the overlap between SELECT and INSERT commands, plotted thelast output activation of CNN using t-SNE dimension reduction algorithm [26]. t-SNEalgorithm is a dimension reduction technique that is capable of retaining the localstructure of the data while also revealing some important global structure. Each pointrepresents each query, the distance between points is similarity, and the color repre-sents its role. The queries which consists of SELECT and INSERT commands aremessily mapped in upper left and center parts.

Fig. 6. Confusion matrix of the CN-LCS

Fig. 7. The activations visualized from the last layer by t-SNE (Color figure online)

A Hybrid System of Deep Learning and Learning Classifier System 623

Page 10: A Hybrid System of Deep Learning and Learning Classifier ...sclab.yonsei.ac.kr/publications/Papers/IC/2017_HAIS_SJB.pdf · A Hybrid System of Deep Learning and Learning Classifier

5 Concluding Remarks

In this paper, we propose a hybrid system of CN-LCS to detect intrusions on database,especially against insider attack. Experimental results have shown that the proposedCN-LCS outperformed other machine learning classifiers. The t-SNE algorithm wasused for the analysis on the classification result of CN-LCS, revealing that the overlapsbetween commands in query caused poor classification performance.

Future works will include the comparison of the proposed CN-LCS with other LCSimplementations, and also the application of CN-LCS to other fields. Feature selectionusing genetic algorithm and high-dimensional feature modeling usingconvolution-pooling operations are expected to be suitable for pattern recognition,especially in high-resolution image classification problem. Distinguishing the temporaldecline in classification accuracy due to genetic operation during learning is anotherissue to explore. To ensure stable performance, it is also necessary to change or tunethe genetic operators used in CN-LCS.

Acknowledgements. This work was supported by Defense Acquisition Program Administrationand Agency for Defense Development under the contract (UD160066BD).

References

1. Lee, S.Y., Low, W.L., Wong, P.Y.: Learning fingerprints for a database intrusion detectionsystem. In: Gollmann, D., Karjoth, G., Waidner, M. (eds.) ESORICS 2002. LNCS, vol.2502, pp. 264–279. Springer, Heidelberg (2002). doi:10.1007/3-540-45853-0_16

2. Ronao, C.A., Cho, S.-B.: Mining SQL queries to detect anomalous database access usingrandom forest and PCA. In: Ali, M., Kwon, Y.S., Lee, C.-H., Kim, J., Kim, Y. (eds.)IEA/AIE 2015. LNCS, vol. 9101, pp. 151–160. Springer, Cham (2015). doi:10.1007/978-3-319-19066-2_15

3. Jin, X., Osborn, S.L.: Architecture for data collection in database intrusion detectionsystems. In: Jonker, W., Petković, M. (eds.) SDM 2007. LNCS, vol. 4721, pp. 96–107.Springer, Heidelberg (2007). doi:10.1007/978-3-540-75248-6_7

4. Mathes, S., Petropoulos, M., Ngo, H.Q., Upadhyaya, S.: A data-centric approach to insiderattack detection in database systems. In: International Workshop on Recent Advances inIntrusion Detection, pp. 382–401 (2010)

5. Pinzon, C.I., De Paz, J.F., Herrero, A., Corchado, E., Bajo, J., Corchado, J.M.: idMAS-SQL:intrusion detection based on MAS to detect and block SQL injection through data mining.Inf. Sci. 231, 15–31 (2013)

6. Ronao, C.A., Cho, S.-B.: Random forests with weighted voting for anomalous query accessdetection in relational databases. In: Rutkowski, L., Korytkowski, M., Scherer, R.,Tadeusiewicz, R., Zadeh, L.A., Zurada, J.M. (eds.) ICAISC 2015. LNCS, vol. 9120,pp. 36–48. Springer, Cham (2015). doi:10.1007/978-3-319-19369-4_4

7. Dam, H.H., Abbass, H.A., Lokan, C., Yao, X.: Neural-based learning classifier systems.IEEE Trans. Knowl. Data Eng. 20, 26–39 (2008)

8. LeCun, Y., Bengio, Y., Hinton, G.: Deep learning. Nature 521, 436–444 (2015)9. Hu, Y., Panda, B.: A data mining approach for database intrusion detection. In: Proceedings

of the 2004 ACM Symposium on Applied Computing, pp. 711–716 (2004)

624 S.-J. Bu and S.-B. Cho

Page 11: A Hybrid System of Deep Learning and Learning Classifier ...sclab.yonsei.ac.kr/publications/Papers/IC/2017_HAIS_SJB.pdf · A Hybrid System of Deep Learning and Learning Classifier

10. Rajput, I.J., Shrivastava, D.: Data mining based database intrusion detection system: asurvey. Int. J. Eng. Res. Appl. 2, 1752–1755 (2012)

11. Barbará, D., Goel, R., Jajodia, S.: Mining malicious corruption of data with hidden markovmodels. In: Gudes, E., Shenoi, S. (eds.) Research Directions in Data and ApplicationsSecurity. ITIFIP, vol. 128, pp. 175–189. Springer, Boston, MA (2003). doi:10.1007/978-0-387-35697-6_14

12. Valeur, F., Mutz, D., Vigna, G.: A learning-based approach to the detection of SQL attacks.In: Julisch, K., Kruegel, C. (eds.) DIMVA 2005. LNCS, vol. 3548, pp. 123–140. Springer,Heidelberg (2005). doi:10.1007/11506881_8

13. Ramasubramanian, P., Kannan, A.: A genetic-algorithm based neural network short-termforecasting framework for database intrusion prediction system. Soft. Comput. 10, 699–714(2006)

14. Kamra, A., Ber, E.: Survey of machine learning methods for database security. In: Kamra,A., Ber, E. (eds.) Machine Learning in Cyber Trust, pp. 53–71. Springer, USA (2009)

15. Pionzon, C., De Paz, J.F., Herrero, A., Corchado, E., Bajo, J.: A distributed hierarchicalmulti-agent architecture for detecting injections in SQL queries. In: Herrero, Á., Corchado,E., Redondo, C., Alonso, Á. (eds.) Computational Intelligence in Security for InformationSystems, pp. 51–59. Springer, Berlin (2010)

16. Hinton, G.E., Salakhutdinov, R.R.: Reducing the dimensionality of data with neuralnetworks. Science 313, 504–507 (2006)

17. Krizhevsky, A., Sutskever, I., Hinton, G.E.: ImageNet classification with deep convolutionalneural networks. In: Advances in Neural Information Processing Systems, pp. 1097–1105(2012)

18. Szegedy, C., Liu, W., Jia, Y., Sermanet, P., Reed, S., Anguelov, D., Rabinovich, A.: Goingdeeper with convolutions. In: Proceedings of the IEEE Conference on Computer Vision andPattern Recognition, pp. 1–9 (2015)

19. Yang, J., Honavar, V.: Feature subset selection using a genetic algorithm. In: FeatureExtraction, Construction and Selection, pp. 117–136 (1998)

20. Goldberg, D.E., Holland, J.H.: Genetic algorithms and machine learning. Mach. Learn. 3,95–99 (1988)

21. Oreski, S., Oreski, G.: Genetic algorithm-based heuristic for feature selection in credit riskassessment. Expert Syst. Appl. 41, 2052–2064 (2014)

22. Van Der Maaten, L., Postma, E., Van den Herik, J.: Dimensionality reduction: acomparative. J. Mach. Learn. Res. 10, 66–71 (2009)

23. Sainath, T.N., Mohamed, A.R., Kingsbury, B., Ramabhadran, B.: Deep convolutional neuralnetworks for LVCSR. In: Acoustics, Speech and Signal Processing, pp. 8614–8618 (2013)

24. He, K., Zhang, X., Ren, S., Sun, J.: Deep residual learning for image recognition. In:Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 770–778 (2016)

25. Abadi, M., Barham, P., Chen, J., Chen, Z., Davis, A., Dean, J., Kudlur, M.: Tensorflow: asystem for large-scale machine learning. In: Proceedings of the 12th USENIX Symposiumon Operating Systems Design and Implementation (2016)

26. Maaten, L.V.D., Hinton, G.: Visualizing data using t-SNE. J. Mach. Learn. Res. 9, 2579–2605 (2008)

A Hybrid System of Deep Learning and Learning Classifier System 625


Recommended