Intrusion detection mechanism with machine learning process A case study with FMIFSSVM, FLCFSSVM, misuses SVM, anomaly SVM and Bayesian methods

 
 
 
  • Abstract
  • Keywords
  • References
  • PDF
  • Abstract


    Today, there is a far reaching of Internet benefits everywhere throughout the world, numerous sorts and vast number of security dangers are expanding. Since it isn't in fact possible to assemble a framework without any vulnerability, Intrusion Detection System (IDS), which can successfully distinguish Intrusion, gets to have pulled in consideration. Intrusion detection can be characterized as the way toward distinguishing irregular, unauthorized or unapproved action that objective is to target a system and its assets. IDS plays a very important role for analyzing the network passage, also it assumes a key part to analyze the system activity log and each log is portrayed by huge arrangement of highlights and it requires tremendous computational preparing force and time for the characterization procedure. This work proposes filter based feature selection methods to predict intrusion with Feature based Mutual Information Feature Selection Support Vector Machine (FMIFSSVM), Feature based Liner Correlation Feature Selection Support Vector Machine (FLCFSSVM), misuses SVM, anomaly SVM and Bayesian methods. The performances of these methods are considered by using the intrusion detection calculation data set called Knowledge Discovery in Databases (KDD) cup 99. Detection Rate (DR), False Alarm Rate (FAR) and Percentage of Successful Prediction (PSP) are the major performance measures studied in this work.


  • Keywords


    IDS; FMIFSSVM; FLCFSSVM; Misuse SVM; Percentage of Successful Prediction (PSP).

  • References


      [1]. Amiri M, Feizi-Derakhshi MR, Mohammad-Khanli L, "IDS fitted Q improvement using fuzzy approach for resource provisioning in cloud",Journal of Intelligent & Fuzzy Systems, Vol.32, issue.1, pp.229-240, 2017.

      [2]. Pacheco J, Zhu X, Badr Y, Hariri S., "Enabling Risk Management for Smart Infrastructures with an Anomaly Behavior Analysis Intrusion Detection System", International Workshops on Foundations and Applications of Self* Systems (FAS* W), pp. 324-328, 2017.

      [3]. Puri A, Sharma N., "A novel technique for intrusion detection system for network security using hybrid SVM-cart", International Journal of Engineering Development and Research, Vol.2, issue,17, pp. 155-161, 2017.

      [4]. Stefanova Z, Ramachandran K., “Network attribute selection, classification and accuracy (NASCA) procedure for intrusion detection systems”, International Symposium on Technologies for Homeland Security (HST), pp. 1-7, 2017.

      [5]. Han J, Qian C, Wang X, Ma D, Zhao J, Xi W, Jiang Z, Wang Z., “Twins: Device-free object tracking using passive tags”, IEEE/ACM Transactions on Networking, vol.24, issue.3, pp.1605-1617, 2016.

      [6]. Sharma N, Gaur B., “An approach for efficient intrusion detection for KDD dataset: a survey.” International Journal of Advanced Technology and Engineering Exploration, vol.3 (18), pp: 72. 2016.

      [7]. Kumar GR, Mangathayaru N, Narsimha G.,” Intrusion Detection-A Text Mining Based Approach.” International Journal of Computer Science and Information Security. Feb 1, vol.1, pp.76, 2016.

      [8]. Ruan Z, Miao Y, Pan L, Patterson N, Zhang J., “Visualization of big data security—A case study on the KDD99 cup data set:. Digital Communications and Networks. Aug 12.,2017

      [9]. WarrenderC., Forrest S. and Pearl M.,“Detecting Intrusions Using System Calls: Alternative Data Models”, inIEEE symposium on security and privacy, pp:133-145, 1999.

      [10]. Wenke L. and S. J.Stolfo, "A Framework for Constructing Features and Models for Intrusion Detection Systems”, ACM transactions on Information and system security (TISSEC), vol.3, Issue 4, Nov 2000.

      [11]. Agarwal R., Joshi M.V., “PNrule: A New Framework for Learning Classifier Models in Data Mining”, Tech. Report, Dept. of Computer Science, University of Minnesota, 2000.

      [12]. Li Y, Xia J, Zhang S, Yan J, Ai X, Dai K.,” An efficient intrusion detection system based on support vector machines and gradually feature removal method”. Expert Systems with Applications.vol.1, pp. 424-30, 2012.

      [13]. Daniel B., J.Couto, S.Jajodia, and N.Wu, "ADAM: A Test Bed for Exploring the Use of Data Mining in Intrusion Detection”, SIGMOD, vol30, issue no.4, pp: 15-24, 2001.

      [14]. Abraham T., "IDDM: Intrusion Detection Using Data Mining Techniques”, Technical report DSTO electronics and surveillance research laboratory, Salisbury, Australia, May 2001.

      [15]. Zheng Z.,J. Li, C.N. Manikapoulos, J.Jorgenson, J.ucles, "HIDE: A Hierarchical Network Intrusion Detection System Using Statistical Pre-Processing and Neural Network Classification”, IEEE workshop proceedings on Information assurance and security, pp: 85-90, 2001.

      [16]. YeungD. Y. and ChowC., “Prazen-window Network Intrusion Detectors”,in: 16th International Conference on Pattern Recognition, Quebec, Canada, pp: 11–15, 2002.

      [17]. XuX., “Adaptive Intrusion Detection Based on Machine Learning: Feature Extraction, Classifier Construction and equential Pattern Prediction”, International Journal of Web Services Practices vol 2, issue 1, pp: 49–58, 2006.

      [18]. Li Y., GuoL., “An Active Learning Based TCM-KNN Algorithm for Supervised Network Intrusion Detection”, In: 26th Computers and Security, pp: 459–467, 2007.

      [19]. MrutyunjayaP. and M. Ranjan Patra,” Evaluating Machine Learning Algorithms for Detecting Network Intrusions”, International Journal of Recent Trends in Engineering, vol. 1, no.1, 2009.

      [20]. Mohammed M Mazid, M. Shawkat Ali, Kevin S. Tickle,“A Comparison Between Rule Based andAssociation Rule Mining Algorithms “, Third International Conference on Network and System Security, 2009.

      [21]. Sathyabama S., Irfan Ahmed M., Saravanan A,”Network Intrusion Detection Using Clustering: A Data Mining Approach”, International Journal of Computer Application (0975-8887), vol. 30, no. 4, Sep. 2011.

      [22]. Ibor AE, Epiphaniou G.” A Hybrid Mitigation Technique for Malicious Network Traffic based on Active Response”, International Journal of Security and Its Applications.Vol.9,issue 4,pp: 63

      [23]. da Cunha JA, Moura E, Analide C. “Data Mining in AcademicDatabases to Detect Behaviors of Students Related to SchoolDropout and Disapproval”, InWorldCIST (2) pp. 189-198, 2016.

      [24]. Buczak AL, Guven E. “A survey of data mining and machinelearning methods for cyber security intrusion detection". IEEECommunications Surveys & Tutorials. vol 1;issue 2:pp.1153-76, 2016

      [25]. Novaković J. “Toward optimal feature selection using ranking methods and classification algorithms.” Yugoslav Journal of Operations Research. Vol.1, 2016

      [26]. Ambusaidi MA, He X, Nanda P, Tan Z. Building an intrusiondetection system using a filter-based feature selection algorithm. IEEE transactions on computers.vol 1, pp.2986-98,2016

      [27]. Chung AG, Shafiee MJ, Wong “A. Random feature maps via a Layered Random Projection (LARP) framework for object classification”., InImage Processing (ICIP),pp. 246-250, IEEE, 2016

      [28]. Muda Z, YassiClustering and Naive Bayes Classification for Intrusion Detection”, Journal of IT in Asia. Vol 4, issue 1, pp: 13-25, 2016.


 

View

Download

Article ID: 10597
 
DOI: 10.14419/ijet.v7i2.7.10597




Copyright © 2012-2015 Science Publishing Corporation Inc. All rights reserved.