Detection of novel attacks by anomaly intrusion detection system using classifiers

  • Authors

    • P. M. Abhinaya
    • V. Nivethitha
    2018-02-05
    https://doi.org/10.14419/ijet.v7i1.7.9571
  • Information Gain Selection, Kstar, Bayesian, Bayes Net, Classification, IBK, Naïve Bayes, Lazy.
  • Abstract

    Nowadays analyzing unsuspicious network traffic has become a necessity to protect organizations from intruders. Really it is a big challenge to accurately identify threats due to the high volume of network traffic. In the existing system, to detect whether network traffic is normal or abnormal we need lots of information about the network. When lot of information is involved in the identification process the relationship between different attributes and the important attributes consider for classification plays an important role in the accuracy. Information gain selection process is used to provide a rank for features. Based on the rank, the most contributed features in the network is found and used to improve the detection rate based on the features selection. In this project, the performance of Lazy and Bayesian classifiers is analysed. In lazy classifier comes there are some algorithms namely, IBK and Kstar. Bayesian classifier comes there are some algorithms namely, Bayes Net, and Naïve Bayes. The performances of Bayesian and lazy classifiers are analysed by applying various performance metrics to identify the best classifier. It is observed that, the efficiency of lazy classifier is better as compared to that of Bayesian classifier.

  • References

    1. [1] SY Ji, BK Jeong, S Choi and DH Jeong, “A multi-level intrusion detection method for abnormal network behaviors†ELSEVIER: Journal of Network and Computer Applications, vol.62, pp.9-17, 2016. https://doi.org/10.1016/j.jnca.2015.12.004.

      [2] Huang L, Milne D, Frank E, Witten IH, “Learning a conceptâ€based document similarity measureâ€, Journal of the Association for Information Science and Technology, pp.1593-608, 2012. https://doi.org/10.1002/asi.22689.

      [3] Vaithiyanathan V, Rajeswari K, Kapil Tajane and Rahul Pitale, “Comparison of different classification techniques using different datasetsâ€, International Journal of Advances in Engineering & Technology, May 2013.

      [4] Sharma TC, Jain M, “WEKA approach for comparative study of classification algorithmâ€, International Journal of Advanced Research in Computer and Communication Engineering. April 2013.

      [5] Amor NB, Benferhat S, Elouedi Z, “Naive bayes vs decision trees in intrusion detection systemsâ€, ACM symposium on applied computing, vol.14, pp. 420-424, March 2013.

      [6] S. Durai , N. Rajkumar, N. K. Manikandan and D. Manivannan “Data Entry Works in computer using Voice Keyboard†, Indian Journal of Science and Technology, Vol 9 (2), January 2016 http://nsl.cs.unb.ca/NSL-KDD/. https://doi.org/10.17485/ijst/2016/v9i2/85814.

      [7] Aljawarneh S, Aldwairi M, Yassein MB,â€Anomaly-based intrusion detection system through feature selection analysis and building hybrid efficient modelâ€, Journal of Computational Science, March 2017. https://doi.org/10.1016/j.jocs.2017.03.006.

      [8] Garcia-Teodoro P, Diaz-Verdejo J, Maciá-Fernández G, Vázquez E,“Anomaly-based network intrusion detection: Techniquesâ€, systems and challenges. Computers & security, pp.18-28, March 2009. https://doi.org/10.1016/j.cose.2008.08.003.

      [9] Alaei P, Noorbehbahani F, “Incremental anomaly-based intrusion detection system using limited labeled dataâ€, IEEE: International Conference, pp. 178-184, April 2017. https://doi.org/10.1109/ICWR.2017.7959324.

      [10] Van NT, Thinh TN, Sach LT, “An anomaly-based network intrusion detection system using Deep learning. InSystem Science and Engineeringâ€, IEEE International Conference pp. 210-214, July 2017.

  • Downloads

  • How to Cite

    Abhinaya, P. M., & Nivethitha, V. (2018). Detection of novel attacks by anomaly intrusion detection system using classifiers. International Journal of Engineering & Technology, 7(1.7), 54-58. https://doi.org/10.14419/ijet.v7i1.7.9571

    Received date: 2018-02-17

    Accepted date: 2018-02-17

    Published date: 2018-02-05