Intrusion detection mechanism with machine learning process A case study with FMIFSSVM, FLCFSSVM, misuses SVM, anomaly SVM and Bayesian methods

  • Authors

    • K V S S R Murthy
    • K V V Satyanarayana
    2018-03-18
    https://doi.org/10.14419/ijet.v7i2.7.10597
  • IDS, FMIFSSVM, FLCFSSVM, Misuse SVM, Percentage of Successful Prediction (PSP).
  • Today, there is a far reaching of Internet benefits everywhere throughout the world, numerous sorts and vast number of security dangers are expanding. Since it isn't in fact possible to assemble a framework without any vulnerability, Intrusion Detection System (IDS), which can successfully distinguish Intrusion, gets to have pulled in consideration. Intrusion detection can be characterized as the way toward distinguishing irregular, unauthorized or unapproved action that objective is to target a system and its assets. IDS plays a very important role for analyzing the network passage, also it assumes a key part to analyze the system activity log and each log is portrayed by huge arrangement of highlights and it requires tremendous computational preparing force and time for the characterization procedure. This work proposes filter based feature selection methods to predict intrusion with Feature based Mutual Information Feature Selection Support Vector Machine (FMIFSSVM), Feature based Liner Correlation Feature Selection Support Vector Machine (FLCFSSVM), misuses SVM, anomaly SVM and Bayesian methods. The performances of these methods are considered by using the intrusion detection calculation data set called Knowledge Discovery in Databases (KDD) cup 99. Detection Rate (DR), False Alarm Rate (FAR) and Percentage of Successful Prediction (PSP) are the major performance measures studied in this work.

  • References

    1. [1]. Amiri M, Feizi-Derakhshi MR, Mohammad-Khanli L, "IDS fitted Q improvement using fuzzy approach for resource provisioning in cloud",Journal of Intelligent & Fuzzy Systems, Vol.32, issue.1, pp.229-240, 2017.

      [2]. Pacheco J, Zhu X, Badr Y, Hariri S., "Enabling Risk Management for Smart Infrastructures with an Anomaly Behavior Analysis Intrusion Detection System", International Workshops on Foundations and Applications of Self* Systems (FAS* W), pp. 324-328, 2017.

      [3]. Puri A, Sharma N., "A novel technique for intrusion detection system for network security using hybrid SVM-cart", International Journal of Engineering Development and Research, Vol.2, issue,17, pp. 155-161, 2017.

      [4]. Stefanova Z, Ramachandran K., “Network attribute selection, classification and accuracy (NASCA) procedure for intrusion detection systemsâ€, International Symposium on Technologies for Homeland Security (HST), pp. 1-7, 2017.

      [5]. Han J, Qian C, Wang X, Ma D, Zhao J, Xi W, Jiang Z, Wang Z., “Twins: Device-free object tracking using passive tagsâ€, IEEE/ACM Transactions on Networking, vol.24, issue.3, pp.1605-1617, 2016.

      [6]. Sharma N, Gaur B., “An approach for efficient intrusion detection for KDD dataset: a survey.†International Journal of Advanced Technology and Engineering Exploration, vol.3 (18), pp: 72. 2016.

      [7]. Kumar GR, Mangathayaru N, Narsimha G.,†Intrusion Detection-A Text Mining Based Approach.†International Journal of Computer Science and Information Security. Feb 1, vol.1, pp.76, 2016.

      [8]. Ruan Z, Miao Y, Pan L, Patterson N, Zhang J., “Visualization of big data security—A case study on the KDD99 cup data set:. Digital Communications and Networks. Aug 12.,2017

      [9]. WarrenderC., Forrest S. and Pearl M.,“Detecting Intrusions Using System Calls: Alternative Data Modelsâ€, inIEEE symposium on security and privacy, pp:133-145, 1999.

      [10]. Wenke L. and S. J.Stolfo, "A Framework for Constructing Features and Models for Intrusion Detection Systemsâ€, ACM transactions on Information and system security (TISSEC), vol.3, Issue 4, Nov 2000.

      [11]. Agarwal R., Joshi M.V., “PNrule: A New Framework for Learning Classifier Models in Data Miningâ€, Tech. Report, Dept. of Computer Science, University of Minnesota, 2000.

      [12]. Li Y, Xia J, Zhang S, Yan J, Ai X, Dai K.,†An efficient intrusion detection system based on support vector machines and gradually feature removal methodâ€. Expert Systems with Applications.vol.1, pp. 424-30, 2012.

      [13]. Daniel B., J.Couto, S.Jajodia, and N.Wu, "ADAM: A Test Bed for Exploring the Use of Data Mining in Intrusion Detectionâ€, SIGMOD, vol30, issue no.4, pp: 15-24, 2001.

      [14]. Abraham T., "IDDM: Intrusion Detection Using Data Mining Techniquesâ€, Technical report DSTO electronics and surveillance research laboratory, Salisbury, Australia, May 2001.

      [15]. Zheng Z.,J. Li, C.N. Manikapoulos, J.Jorgenson, J.ucles, "HIDE: A Hierarchical Network Intrusion Detection System Using Statistical Pre-Processing and Neural Network Classificationâ€, IEEE workshop proceedings on Information assurance and security, pp: 85-90, 2001.

      [16]. YeungD. Y. and ChowC., “Prazen-window Network Intrusion Detectorsâ€,in: 16th International Conference on Pattern Recognition, Quebec, Canada, pp: 11–15, 2002.

      [17]. XuX., “Adaptive Intrusion Detection Based on Machine Learning: Feature Extraction, Classifier Construction and equential Pattern Predictionâ€, International Journal of Web Services Practices vol 2, issue 1, pp: 49–58, 2006.

      [18]. Li Y., GuoL., “An Active Learning Based TCM-KNN Algorithm for Supervised Network Intrusion Detectionâ€, In: 26th Computers and Security, pp: 459–467, 2007.

      [19]. MrutyunjayaP. and M. Ranjan Patra,†Evaluating Machine Learning Algorithms for Detecting Network Intrusionsâ€, International Journal of Recent Trends in Engineering, vol. 1, no.1, 2009.

      [20]. Mohammed M Mazid, M. Shawkat Ali, Kevin S. Tickle,“A Comparison Between Rule Based andAssociation Rule Mining Algorithms “, Third International Conference on Network and System Security, 2009.

      [21]. Sathyabama S., Irfan Ahmed M., Saravanan A,â€Network Intrusion Detection Using Clustering: A Data Mining Approachâ€, International Journal of Computer Application (0975-8887), vol. 30, no. 4, Sep. 2011.

      [22]. Ibor AE, Epiphaniou G.†A Hybrid Mitigation Technique for Malicious Network Traffic based on Active Responseâ€, International Journal of Security and Its Applications.Vol.9,issue 4,pp: 63

      [23]. da Cunha JA, Moura E, Analide C. “Data Mining in AcademicDatabases to Detect Behaviors of Students Related to SchoolDropout and Disapprovalâ€, InWorldCIST (2) pp. 189-198, 2016.

      [24]. Buczak AL, Guven E. “A survey of data mining and machinelearning methods for cyber security intrusion detection". IEEECommunications Surveys & Tutorials. vol 1;issue 2:pp.1153-76, 2016

      [25]. Novaković J. “Toward optimal feature selection using ranking methods and classification algorithms.†Yugoslav Journal of Operations Research. Vol.1, 2016

      [26]. Ambusaidi MA, He X, Nanda P, Tan Z. Building an intrusiondetection system using a filter-based feature selection algorithm. IEEE transactions on computers.vol 1, pp.2986-98,2016

      [27]. Chung AG, Shafiee MJ, Wong “A. Random feature maps via a Layered Random Projection (LARP) framework for object classificationâ€., InImage Processing (ICIP),pp. 246-250, IEEE, 2016

      [28]. Muda Z, YassiClustering and Naive Bayes Classification for Intrusion Detectionâ€, Journal of IT in Asia. Vol 4, issue 1, pp: 13-25, 2016.

  • Downloads

  • How to Cite

    V S S R Murthy, K., & V V Satyanarayana, K. (2018). Intrusion detection mechanism with machine learning process A case study with FMIFSSVM, FLCFSSVM, misuses SVM, anomaly SVM and Bayesian methods. International Journal of Engineering & Technology, 7(2.7), 277-283. https://doi.org/10.14419/ijet.v7i2.7.10597