Intrusion Detection using Artificial Neural Networks with Best Set of Features
|
|
|
- Phyllis Porter
- 10 years ago
- Views:
Transcription
1 728 The International Arab Journal of Information Technology, Vol. 12, No. 6A, 2015 Intrusion Detection using Artificial Neural Networks with Best Set of Features Kaliappan Jayakumar 1, Thiagarajan Revathi 2, and Sundararajan Karpagam 1 1 Department of Computer Science and Engineering, Kamaraj College of Engineering and Technology, India 2 Department of Information Technology, Mepco Schlenk Engineering College, India Abstract: An Intrusion Detection System (IDS) monitors the behavior of a given environment and identifies the activities are malicious (intrusive) or legitimate (normal) based on features obtained from the network traffic data. In the proposed method, instead of considering all features for intrusion detection and wasting up the time in analyzing it, only the relevant feature for the particular attack is selected and intrusion detection is done with help of supervised learning Neural Network (NN). The feature selection is done with the help of information gain algorithm and genetic algorithm. The Multi Layer Perceptron (MLP) supervised NN is used to train the relevant features alone in our proposed system. This system improves the Detection Rate (DTR) for all types of attacks when compared to Intrusion detection system which uses all features and selected features using genetic algorithm with MLP NN as the classifier. Our proposed system results, in detecting intrusions with higher accuracy, especially for Remote to Local (R2L), User to Root (U2R) and Denial of Service (DoS) attacks. Keywords: IDS, genetic algorithm, feature selection, NN, information gain. Received March 13, 2013; accepted June 9, 2014; published online August 9, Introduction An Introduction to Intrusion Detection System (IDS), feature selection and Neural Network (NN) is discussed Intrusion Detection System IDS detect malicious or suspicious activities in the network. An ID was first introduced by Anderson [1] and it was later improved by Denning [6]. IDS can be in the form of an application or device, just like firewall. Basically, there are two Intrusion Detection techniques: Anomaly detection and misuse detection [7]. Anomaly detection [7] is based on assumption that attacker behavior is different from normal user s behavior. The strategy is to look for odd or abnormal activities in a system or network one of the advantages of this detection is that it has high Detection Rate (DTR) and able to detect new attack. Misuse Detection [10] (also known as signaturebased detection), uses pattern matching. In order to determine an attack, it compares the data with the signature in signature database and if the data matches with the pattern as in signature data base, it detects the attack. This type of detection has high DTR with low false alarm. In this paper, the first technique i.e., the anomaly detection is used. The anomaly detection can be implemented using different techniques such as statistical model, computer immunological approach and machine learning Feature Selection Feature selection is the most crucial step in constructing intrusion detection system [7]. A set of attributes or features that identified to be the most effective, are extracted in order to construct suitable IDS. In feature selection, a key problem is to choose the optimal set of features as not all features are relevant to the learning algorithm. Also, in some cases redundant features can lead to noisy data that distract the learning algorithm and degrade the accuracy of the IDS which slow the training and testing process. Feature selection is proven to have an important impact on the performance of the classifiers. Experiments show that feature selection can reduce the building and testing time of a classifier Artificial Neural Networks The NN is data processing units which imitate the neurons of human brain. The Figure 1 shows classification of Artificial Neural Networks (ANN). Multi Layer Perceptron (MLP) is generally used NN architecture in several pattern identification problems. An MLP network consists of an input layer with a set of nodes such as input nodes, one or more hidden layers of processing nodes and an output layer of computation nodes. Each interconnection is associated with a scalar weight which is adjusted during the training phase. In addition, the back propagation learning algorithm is usually used to train a MLP, which is also called as back propagation neural networks. First of all, random weights are given at the beginning of training. Then, the algorithm performs weights tuning to define whatever hidden unit representation is most effective at minimizing the error of misclassification.
2 Intrusion Detection using Artificial Neural Networks with Best Set of Features 729 Feature selection using Genetic Algorithm Training Dataset KDDCup99 Dataset Pre-Processing: Data Extraction, Symbolic Conversion and Data Normalization Convert Data Normalization Feature Ranking using Information Gain Test Dataset NN Trained NN Model Testing NN Performance Evaluation and Results Figure 1. System flow diagram. The paper is organized as follows: A Literature survey is given in the section 2. Details of KDD cup 99 dataset are given in section 3. Proposed systems are elaborated in section 4. Data preprocessing steps are given in section 4.1. Feature selection mechanisms are explained in section 4.2. The procedure of training and testing NNs are given in section 4.3. Performance evaluation, experiment details and the results are given in section 5. Section 6 concludes the paper with a sum up. 2. Related Work Current IDSs use numerous techniques. Some of the techniques used for intrusion detection are statistic, hidden Markov, ANN, fuzzy logic [4], rule learning and outlier detection schema. Chebrolu et al. [2] have identified significant input features in building IDS that is computationally efficient for detection systems. In the feature selection phase, Markov blanket model and decision tree analysis has been used. Bayesian Network (BN) Classifier and Regression Trees (CART) have been used to make an intrusion detection model. Chena et al. [3] have used a Flexible Neural Tree (FNT) model for the IDS. The FNT model reduces the number of features. Using 41 features, the best accuracy for the Denial of Service (DoS) and User Gain Root (U2R) is given by the FNT model. The decision tree classifier supply the best accuracy for normal and probe classes, which are an improved less than the FNT classifiers. Sung and Mukkamala [11] have removed one feature at a time to carry out an experiment on SVM and NN. KDD cup 1999 dataset has been used to verify this technique. In terms of the five-class classification, only 19 of the most significant feature are used, rather than all the 41features. Cho [5] conduct a work where fuzzy logic and hidden Markov model have been deployed together to detect intrusions. In this work, the hidden Markov model is used for the feature reduction. Li et al. [9] proposed a wrapper based feature selection algorithm to construct lightweight IDS. They applied modified RMHC for search strategy and modified linear SVM for valuation criterion. Their method speeds up the process of selecting features and generates high detection rates for an IDS. 3. KDD Cup 99 Dataset The data set used in these experiments is KDD Cup 99 data [8], a well-known standard dataset for intrusion detection.the dataset includes a set of 41 features derived from each connection with label which specifies the status of connection records as either normal or specific attack type. Attacks are classified in to four main categories: 1. DoS. 2. Remote File Access (R2L). 3. U2R. 4. Probe. The various attacks in each category are listed in Table 1. Table 1. Different attacks falling into four major categories. Attack Type Probe DoS U2R R2L Attack Pattern Ipsweep, nmap, portsweep, satan, mscan, saint back, land, neptune, pod, smurf, teardrop, apache2, mailbomb, processtable, udpstorm Buffer_overflow, loadmodule, perl, rootkit, ps, sqlattack, httptunnel, xterm ftp_write, guess_passwd, imap, multihop, phf, spy, warezclient, warezmaster, snmpgetattack, named, xlook, xsnoop, snmpguess, worm, sendmail The sample distributions on the subset of 10% data of KDD Cup 99dataset is shown in Table 2. Table 2. 10% data of KDD Cup 99 dataset. Class Number of Samples Samples Percent (%) Normal Probe DoS U2R R2L % Randomly selected data for training are listed in Table 3. Table 3. The sample distributions on the train data with the corrected labels of KDD Cup 99 dataset. Class Number of samples Samples percent (%) Normal Probe DoS U2R R2L
3 730 The International Arab Journal of Information Technology, Vol. 12, No. 6A, 2015 The sample distributions on the test data with the corrected labels of KDD Cup 99 dataset is shown in Table 4. Table 4. The new attacks sample distributions on the test data with the corrected labels of KDD Cup 99 dataset. Class Number of Novel Attack Samples Total Number of Attack Samples Percentage of Novel Attack (%) Probe DoS U2R R2L Proposed System In the proposed system data is pre processed first with extraction of data from the large data set, symbolic conversions and normalization are followed by feature selection in this stage, the selected features are applied to NN for training. For the trained NN the test data is applied and the performance is evaluated. The proposed system flow chart is given in Figure 1. The steps in the proposed system are discussed in detail below Data Preprocessing Steps KDD cup 99 dataset is very large database. So, it is very difficult to consider all the data for the experiment, as it takes time. The preprocessing is based on following steps. 1. Extract of data is made from random training and test data set from full data set. 2. The sample distribution of the randomly chosen training data set and test data set are tabulated in Tables 3 and Symbolic features are converted in to numerical values. 4. Data normalization is the process of scaling the input to fall within a specific range. The min max normalization is used. The formula is given in Equation 1. X X min X n = 2 * 1 X max X min Where X min minimum value of the input, X max maximum value of the input, X n normalized output Feature Ranking (1) Feature ranking is done before training. The process of feature ranking identifies which features are more discriminative than the others. The feature ranking algorithm is given in Figure 2. This helps in improving system performance by eliminating irrelevant and redundant features. The information gains for the feature are calculated and features are ordered according to the information gain value in descending order. Figure 2. Detection rate Information Gain Ratio Let S be a set of training set samples with their corresponding labels. Suppose there are m classes and the training set contains S i samples of class I and s is the total number of samples in the training set, expected information gain ratio needed to classify a given sample. It is calculated by using the formula. S I ( S, S,..., S ) log S S m S i i = 1 2 m 2 i 1 A feature F with values {f 1, f 2,, fv} can divide the training set into v subsets {S 1, S 2,, S v } where S j is the subset which has the value f j for feature F. Furthermore let S j contain S ij samples of class i. Entropy of the feature F is: v S S 1j mj E ( F ) = * I ( S,..., S ) 1j mj j 1 S Information gain for F can be calculated as: IGR = Gain ( F ) = I ( S,..., S ) E ( F ) Feature Selection To reduce the dimensionality and to get better accuracy, the relevant features have to be selected using feature selection algorithm. Genetic algorithm can be used in this process. Genetic algorithm fitness function is designed in such a way that, the number of features selected has to be minimum and the sum of their information gain value should be maximum. The information gain for all the features is calculated and stored in Information Gain IG [ ] as per the Algorithm 1 Infogaincalculation. The genetic algorithm is designed to have a population size of 40.The binary chromosome is used. A chromosome of length 41 is constructed with each bit representing a feature. The fitness Algorithm 2 maxigminfcnt takes the chromosome as input. Scan the chromosome bits, if it is 1, take its respective information gain value and sum it up with the total information gain value. Feature count is calculated which is the total number of 1 s is set in the chromosome. For example, consider the following chromosome If the bit 5 is set (i.e., value=1) then, it indicates that the feature is selected. Its information gain value is 1 m (2) (3) (4)
4 Intrusion Detection using Artificial Neural Networks with Best Set of Features 731 considered for finding the chromosome with minimum features. Steps for Feature Selection: 1. Generate the initial population. 2. Select individuals from the population to be parents. 3. With the help of crossover operator produce offspring. 4. Apply the mutation operator. 5. Calculate the information gain using Algorithm Apply the fitness function given in Algorithm Replace the population with the fittest of the whole population. Algorithm 1: Infogaincalculation. Feature set F [ ] Information Gain IG[ ] foreach (f in F) IG[i]=IGR(f); end for Algorithm 2: Maxigminfcnt. Chromosome Cr [41] for (i=0 to 41) if (Cr[ i ] == 1) then igsum = igsum+ig [ i ]; fcnt = fcnt+1; endif endfor The genetic algorithm parameter values are listed in Table 5. Table 5. Genetic algorithm parameters. Modeling Description Setting Population Size 40 Selection Technique Roulette wheel Crossover Type Uniform crossover Crossover Rate 0.5 Mutation Rate 0.1 Encoding and Initial Population In the GA-based feature selection, an entrant feature set can be represented by a binary string called a chromosome. Chromosomes comprising population are encoded in the form of binary vector in a manner to create of genes as the number of feature in each feature space. The i th bit in the chromosome represents the occurrence of the i th feature. Initialization of the population is generally prepared by seeding the population with random values. If the value of the gene, which is coded in binary system, is 1, it indicates that the corresponding feature is selected, in the converse, if the value of gene is 0, it indicates that the related feature is not selected. In the proposed GA-based feature selection, each chromosome is randomly initialized, with each chromosome in the population coded to a binary. The size of chromosome is equal to the total number of features. Fitness Function Fitness function is used to fix individuals that are fit to the most favorable solution. Every individual has its own fitness value. A higher value of fitness indicates that the individual is more suitable for problem solution; on the other hand, a lower value of fitness means that the individual is less appropriate for a solution. The encoded chromosomes are searched to optimize a fitness function after the initialization of population. In this method, the fitness value of each chromosome is evaluated according to the sum of the information gain of the features selected and the number of features selected. The information gain sum should be maximum and the number of features selected should be minimum for the selection. Selection The aim of the selection process is to choose the individuals of the next generation according to the selected fitness function and selection method among the existing population. In the selection process, the transfer possibility of the fittest individual s chromosome to the next generation is higher than others. The decision of the individual s characteristic which will be transferred to the next generation is based on the values evaluated from the fitness function and shows the quality of the individual. The Roulette wheel selection method which is the most general and most easily applied one is chosen in this work. Crossover In the pre-crossover phase, individuals are identified by using a mating process. Forming the new generation is called crossover. The most commonly used method is forming two new individuals from the two chromosomes. In our work, uniform crossover is used in the crossover procedure. Mutation To increase the range of the chromosomes which are applied on crossover, mutation process can be applied. Mutation introduces local variations to the individuals for searching diverse solution spaces and keeps the variety of the population. In our method, the number of chromosomes that will be mutated is found according to the mutation rate and their values are altered from 1 to 0 or 0 to 1 respectively. Stopping Criteria The stopping criteria are set for this algorithm when maximum number of generations, reaches 25 the algorithm stops Training and Testing the NN A supervised algorithm such as MLP Back Propagation is used for training. A three layer MLP
5 732 The International Arab Journal of Information Technology, Vol. 12, No. 6A, 2015 NN was simulated. The number of neurons in the input layer is the number of features considered for the experiment. Number of neurons in the output layer (sigmoid function) is 2. The number of hidden neurons can be determined using the following rules of thumb: 1. The number of hidden neurons should be two third of the size of the input layer plus the size of the output layer. 2. The amount of hidden neurons should be between the size of the square root of (input neuron*output neuron). 3. The amount of hidden neurons should be less than twice the size of the input layer. 5. Performance Evaluation and Results The performance of the proposed IDS is evaluated with help of confusion matrix. The classification performance of IDS is measured by the False Alarm Rate (FAR), DTR and accuracy. They can be calculated using the confusion matrix in Table 6 and defined as follows: Confusion matrix is a 2 2 matrix, where the rows represent actual classes; while the columns have the values correspond to the predicted classes. Table 6. Confusion matrix. Predicted Attack Predicted Normal Actual Attack True Positive (TP) False Negative (FN) Actual Normal False Positive (FP) True Negative (TN) TP: The number of attack detected when it is actually attack. TN: The number of normal detected when it is actually normal. FP: The number of attack detected when it is actually normal, namely false alarm. FN: The number of normal detected when it is actually attack. FAR = FP * 100 TN + FP DTR = TP * 100 TP + FN Accuracy = TP +TN * 100 TP +TN + FP + FN (5) (6) (7) In this section, the performance of the proposed IDS is studied with the help of two experiments. In experiment I all the features are given as input to the Nn and trained. The test data is given and its accuracy, DTR and FAR are calculated. In experiment II only the relevant features are selected, using the genetic algorithm with information gain as the base. The selected features and training dataset are given as input to the experiment 2 and the performance measures accuracy, DTR, FAR are calculated. The results are tabulated and plotted as graphs Experiment 1 All experiments were performed on a Windows platform having configuration Intel core 2 Duo CPU 2.49 GHZ, 2GBRAM.Simulations and the analysis of experimental data are performed with the use of MATLAB NN Toolbox. The existing supervised and unsupervised algorithms are considered for the experiment. In experiment 1 all features are considered for training the NN s and test data with % of novel data is considered. DTR, FAR and Accuracy for the different types of attack using all the features of the test dataset of KDD Cup 99 dataset are tabulated in Table 7 Table 7. DTR, FPR,, accuracy for different classes on the test data set with corrected labels of KDD Cup 99 data set. Normal Probe DoS U2R R2L DTRR FAR Accuracy Experiment 2 Steps in experiment 2: Step 1: Data preprocessing is done as per the steps given in the section 4.1. Step 2: The information gain is calculated using the formula 4.3. Open source weka software [12] is used to calculate information gain for each feature in the training dataset. Step 3: The genetic algorithm is used to select the features for further processing. The strategy for selection of features is, the sum of information gain of the features must be maximum but, the number of features selected should be minimum. Step 4: The dataset of selected features is trained using the MLP NN. Step 5: For the trained NN the test data with novel data of 28.39% is applied and the performance is evaluated. From the Table 8 we can infer that the DTR for U2R, R2L, Probe and DoS attack are highly improved compared to experiment1. Comparing the accuracy results in experiment 1 with experiment 2 there is a very good improvement in all the attacks except in Normal. The FAR has been decreased marginally compared to experiment 2. Table 8. DTR, FPR, accuracy for different classes on the test data set with corrected labels of KDD Cup 99 data set Normal Probe DoS U2R R2L DTRR FAR Accuracy The Figure 2 shows the graph with DTR values plotted against attacks.it gives the comparison of the DTR obtained in experiment 1 and experiment 2.
6 Intrusion Detection using Artificial Neural Networks with Best Set of Features 733 The Figure 3 shows the graph with FAR values plotted against attacks.it gives the comparison of the FAR s obtained in experiment 1 and experiment 2. Figure 3. FAR. The Figure 4 shows the graph with Accuracy values plotted against attacks. It gives the comparison of the accuracy obtained in experiment 1 and experiment Conclusions Figure 4. Accuracy. The test result proves that the performance measures of IDS get improved when the selected features alone are used instead of all features. In this approach the feature selection is done by genetic algorithm. Genetic algorithm fitness function aims at maximizing the information gain sum and minimizing the features count. Our proposed system provided much improved performance results in detecting intrusions with higher accuracy, especially for R2L, U2R and DoS attacks. References [1] Anderson P., Computer Security Threat Monitoring and Surveillance, available at: df, last visited [2] Chebrolu S., Abraham A., and Thomas P., Feature Deduction and Ensemble Design of Intrusion Detection Systems, Computers and Security, vol. 24, no. 4, pp , [3] Chena Y., Abrahama A., and Yanga B., Feature Selection and Classification using Flexible Neural Tree, Journal of Neuro Computing, vol. 70, no. 1, pp , [4] Chimphlee W., Abdhullah A., Md M., Chimphlee S., and Srinoy S., A Rough-Fuzzy Hybrid Algorithm for Computer Intrusion Detection, the International Arab Journal of Information Technology, vol. 4, no. 3, pp , [5] Cho S., Incorporating Soft Computing Techniques into a Probabilistic Intrusion Detection System, IEEE Transactions on Systems, MAN and Cybernetics, vol. 32, no. 2, pp , [6] Denning E., An Intrusion-Detection Model, IEEE Transaction on Software Engineering, vol. 13, no. 2, pp , [7] Kayacik G., Zincir-Heywood N., and Heywood I., Selecting Features for Intrusion Detection: A Feature Relevance Analysis on KDD 99 Intrusion Detection Datasets, in Proceedings of the 3 rd Annual Conference on Privacy, Security and Trust, Andrews, Canada, [8] KDDCup99 Dataset., available at: kdd.ics.uci.edu//databases/kddcup99/kddcup99.ht ml, last visited [9] Li Y., Wang J., Tiand Z., Luc T., and Young C., Building Lightweight Intrusion Detection System using Wrapper-based Feature Selection Mechanisms, Computers and Security, vol. 28, no. 6, pp , [10] Michalski S., Carbonell G., and Mitchell M., Machine Learning: An Artificial Intelligence Approach, Tioga Publishing Company, [11] Sung A. and Mukkamala S., Identifying Important Features for Intrusion Detection using Support Vector Machines and Neural Networks, in Proceedings of Inter-National Symposium on Applications and the Internet, pp , [12] Weka., available at: ac.nz/ml/weka/, last visited Kaliappan Jayakumar received the BE degree in computer science and engineering from M.K. University, India in 2002 and the ME degree in computer science and engineering from Anna University, India in Currently, he is pursuing his PhD degree in the field of intrusion detection at Anna University, India. He is currently working as an Assistant Professor at the Department of Computer Science and Engineering, Kamaraj college of Engineering and Technology, India. He has presented and published 6 papers in Conferences. His current research interests include: Intrusion detection, data mining and soft computing techniques. He is a Life Member of Indian Society for Technical Education.
7 734 The International Arab Journal of Information Technology, Vol. 12, No. 6A, 2015 Thiagarajan Revathi received the BE degree in electrical and electronics engineering from M.K. University, India in 1986 and the ME degree in computer science and engineering from Bharathiyar University, India in 1995 and PhD degree in computer networks from the M.S. University, India She is currently working as a Professor and Department Head with the Department of Information Technology, MEPCO Schlenk Engineering College, India. She has conducted Workshops and Conferences in the areas of computer networks and multimedia. She has presented and published more than 33 papers in conferences and journals. Her Research interests include: Computer networks, multimedia, data mining, algorithms and network security. She is a Life member of Computer Society of India and Indian Society for Technical Education. Sundararajan Karpagam received the BE degree in computer science and engineering from Anna University, Chennai, India in 2005 and the ME degree in computer science and engineering from Anna University, India in Currently, she is working as an Assistant Professor at the Department of Computer Science and Engineering, Kamaraj college of Engineering and Technology, India. She has presented and published 3 papers in Conferences. Her current research interests include: Data hiding, data mining, neural networks and genetic algorithm. She is a Life Member of Indian Society for Technical Education.
Performance Evaluation of Intrusion Detection Systems using ANN
Performance Evaluation of Intrusion Detection Systems using ANN Khaled Ahmed Abood Omer 1, Fadwa Abdulbari Awn 2 1 Computer Science and Engineering Department, Faculty of Engineering, University of Aden,
Neural networks vs. decision trees for intrusion detection
Neural networks vs. decision trees for intrusion detection Yacine Bouzida Mitsubishi Electric ITE-TCL 1, allée de Beaulieu CS 186 3578, Rennes, France [email protected] Frédéric Cuppens Département
Using Rough Set and Support Vector Machine for Network Intrusion Detection System Rung-Ching Chen and Kai-Fan Cheng
2009 First Asian Conference on Intelligent Information and Database Systems Using Rough Set and Support Vector Machine for Network Intrusion Detection System Rung-Ching Chen and Kai-Fan Cheng Ying-Hao
Euclidean-based Feature Selection for Network Intrusion Detection
2009 International Conference on Machine Learning and Computing IPCSIT vol3 (2011) (2011) IACSIT Press, Singapore Euclidean-based Feature Selection for Network Intrusion Detection Anirut Suebsing, Nualsawat
Detection. Perspective. Network Anomaly. Bhattacharyya. Jugal. A Machine Learning »C) Dhruba Kumar. Kumar KaKta. CRC Press J Taylor & Francis Croup
Network Anomaly Detection A Machine Learning Perspective Dhruba Kumar Bhattacharyya Jugal Kumar KaKta»C) CRC Press J Taylor & Francis Croup Boca Raton London New York CRC Press is an imprint of the Taylor
STUDY OF IMPLEMENTATION OF INTRUSION DETECTION SYSTEM (IDS) VIA DIFFERENT APPROACHS
STUDY OF IMPLEMENTATION OF INTRUSION DETECTION SYSTEM (IDS) VIA DIFFERENT APPROACHS SACHIN MALVIYA Student, Department of Information Technology, Medicaps Institute of Science & Technology, INDORE (M.P.)
USING ROUGH SET AND SUPPORT VECTOR MACHINE FOR NETWORK INTRUSION DETECTION
USING ROUGH SET AND SUPPORT VECTOR MACHINE FOR NETWORK INTRUSION DETECTION Rung-Ching Chen 1, Kai-Fan Cheng 2 and Chia-Fen Hsieh 3 1 Department of Information Management Chaoyang University of Technology
VHDL Modeling of Intrusion Detection & Prevention System (IDPS) A Neural Network Approach
VHDL Modeling of Intrusion Detection & Prevention System (IDPS) A Neural Network Approach Tanusree Chatterjee Department of Computer Science Regent Education and Research Foundation Abstract- The rapid
Feature Selection using Integer and Binary coded Genetic Algorithm to improve the performance of SVM Classifier
Feature Selection using Integer and Binary coded Genetic Algorithm to improve the performance of SVM Classifier D.Nithya a, *, V.Suganya b,1, R.Saranya Irudaya Mary c,1 Abstract - This paper presents,
Network Intrusion Detection System Using Genetic Algorithm and Fuzzy Logic
Network Intrusion Detection System Using Genetic Algorithm and Fuzzy Logic Mostaque Md. Morshedur Hassan Assistant Professor, Department of Computer Science and IT, Lalit Chandra Bharali College, Guwahati,
A Survey on Intrusion Detection System with Data Mining Techniques
A Survey on Intrusion Detection System with Data Mining Techniques Ms. Ruth D 1, Mrs. Lovelin Ponn Felciah M 2 1 M.Phil Scholar, Department of Computer Science, Bishop Heber College (Autonomous), Trichirappalli,
Impact of Feature Selection on the Performance of Wireless Intrusion Detection Systems
2009 International Conference on Computer Engineering and Applications IPCSIT vol.2 (2011) (2011) IACSIT Press, Singapore Impact of Feature Selection on the Performance of ireless Intrusion Detection Systems
A survey on Data Mining based Intrusion Detection Systems
International Journal of Computer Networks and Communications Security VOL. 2, NO. 12, DECEMBER 2014, 485 490 Available online at: www.ijcncs.org ISSN 2308-9830 A survey on Data Mining based Intrusion
An analysis of suitable parameters for efficiently applying K-means clustering to large TCPdump data set using Hadoop framework
An analysis of suitable parameters for efficiently applying K-means clustering to large TCPdump data set using Hadoop framework Jakrarin Therdphapiyanak Dept. of Computer Engineering Chulalongkorn University
Efficient Security Alert Management System
Efficient Security Alert Management System Minoo Deljavan Anvary IT Department School of e-learning Shiraz University Shiraz, Fars, Iran Majid Ghonji Feshki Department of Computer Science Qzvin Branch,
A new Approach for Intrusion Detection in Computer Networks Using Data Mining Technique
A new Approach for Intrusion Detection in Computer Networks Using Data Mining Technique Aida Parbaleh 1, Dr. Heirsh Soltanpanah 2* 1 Department of Computer Engineering, Islamic Azad University, Sanandaj
A SURVEY ON GENETIC ALGORITHM FOR INTRUSION DETECTION SYSTEM
A SURVEY ON GENETIC ALGORITHM FOR INTRUSION DETECTION SYSTEM MS. DIMPI K PATEL Department of Computer Science and Engineering, Hasmukh Goswami college of Engineering, Ahmedabad, Gujarat ABSTRACT The Internet
International Journal of Computer Science Trends and Technology (IJCST) Volume 3 Issue 3, May-June 2015
RESEARCH ARTICLE OPEN ACCESS Data Mining Technology for Efficient Network Security Management Ankit Naik [1], S.W. Ahmad [2] Student [1], Assistant Professor [2] Department of Computer Science and Engineering
A Neural Network Based System for Intrusion Detection and Classification of Attacks
A Neural Network Based System for Intrusion Detection and Classification of Attacks Mehdi MORADI and Mohammad ZULKERNINE Abstract-- With the rapid expansion of computer networks during the past decade,
Developing a hybrid method of Hidden Markov Models and C5.0 as a Intrusion Detection System
, pp.165-174 http://dx.doi.org/10.14257/ijdta.2013.6.5.15 Developing a hybrid method of Hidden Markov Models and C5.0 as a Intrusion Detection System Mahsa Khosronejad, Elham Sharififar, Hasan Ahmadi Torshizi
Hybrid Intrusion Detection System Model using Clustering, Classification and Decision Table
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 9, Issue 4 (Mar. - Apr. 2013), PP 103-107 Hybrid Intrusion Detection System Model using Clustering, Classification
Chapter 1 Hybrid Intelligent Intrusion Detection Scheme
Chapter 1 Hybrid Intelligent Intrusion Detection Scheme Mostafa A. Salama, Heba F. Eid, Rabie A. Ramadan, Ashraf Darwish, and Aboul Ella Hassanien Abstract This paper introduces a hybrid scheme that combines
Credit Card Fraud Detection Using Self Organised Map
International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 4, Number 13 (2014), pp. 1343-1348 International Research Publications House http://www. irphouse.com Credit Card Fraud
Network Intrusion Detection Using a HNB Binary Classifier
2015 17th UKSIM-AMSS International Conference on Modelling and Simulation Network Intrusion Detection Using a HNB Binary Classifier Levent Koc and Alan D. Carswell Center for Security Studies, University
How To Prevent Network Attacks
Ali A. Ghorbani Wei Lu Mahbod Tavallaee Network Intrusion Detection and Prevention Concepts and Techniques )Spri inger Contents 1 Network Attacks 1 1.1 Attack Taxonomies 2 1.2 Probes 4 1.2.1 IPSweep and
FRAUD DETECTION IN ELECTRIC POWER DISTRIBUTION NETWORKS USING AN ANN-BASED KNOWLEDGE-DISCOVERY PROCESS
FRAUD DETECTION IN ELECTRIC POWER DISTRIBUTION NETWORKS USING AN ANN-BASED KNOWLEDGE-DISCOVERY PROCESS Breno C. Costa, Bruno. L. A. Alberto, André M. Portela, W. Maduro, Esdras O. Eler PDITec, Belo Horizonte,
A Review of Anomaly Detection Techniques in Network Intrusion Detection System
A Review of Anomaly Detection Techniques in Network Intrusion Detection System Dr.D.V.S.S.Subrahmanyam Professor, Dept. of CSE, Sreyas Institute of Engineering & Technology, Hyderabad, India ABSTRACT:In
CURRENT STUDIES ON INTRUSION DETECTION SYSTEM, GENETIC ALGORITHM AND FUZZY LOGIC
ABSTRACT CURRENT STUDIES ON INTRUSION DETECTION SYSTEM, GENETIC ALGORITHM AND FUZZY LOGIC Mostaque Md. Morshedur Hassan LCB College, Maligaon, Guwahati, Assam, India. [email protected] Nowadays Intrusion
Predicting the Risk of Heart Attacks using Neural Network and Decision Tree
Predicting the Risk of Heart Attacks using Neural Network and Decision Tree S.Florence 1, N.G.Bhuvaneswari Amma 2, G.Annapoorani 3, K.Malathi 4 PG Scholar, Indian Institute of Information Technology, Srirangam,
Keywords - Intrusion Detection System, Intrusion Prevention System, Artificial Neural Network, Multi Layer Perceptron, SYN_FLOOD, PING_FLOOD, JPCap
Intelligent Monitoring System A network based IDS SONALI M. TIDKE, Dept. of Computer Science and Engineering, Shreeyash College of Engineering and Technology, Aurangabad (MS), India Abstract Network security
IDS IN TELECOMMUNICATION NETWORK USING PCA
IDS IN TELECOMMUNICATION NETWORK USING PCA Mohamed Faisal Elrawy 1, T. K. Abdelhamid 2 and A. M. Mohamed 3 1 Faculty of engineering, MUST University, 6th Of October, Egypt [email protected] 2,3
DECISION TREE INDUCTION FOR FINANCIAL FRAUD DETECTION USING ENSEMBLE LEARNING TECHNIQUES
DECISION TREE INDUCTION FOR FINANCIAL FRAUD DETECTION USING ENSEMBLE LEARNING TECHNIQUES Vijayalakshmi Mahanra Rao 1, Yashwant Prasad Singh 2 Multimedia University, Cyberjaya, MALAYSIA 1 [email protected]
Feature Subset Selection in E-mail Spam Detection
Feature Subset Selection in E-mail Spam Detection Amir Rajabi Behjat, Universiti Technology MARA, Malaysia IT Security for the Next Generation Asia Pacific & MEA Cup, Hong Kong 14-16 March, 2012 Feature
Analysis of KDD CUP 99 Dataset using Clustering based Data Mining
, pp.23-34 http://dx.doi.org/10.14257/ijdta.2013.6.5.03 Analysis of KDD CUP 99 Dataset using Clustering based Data Mining Mohammad Khubeb Siddiqui and Shams Naahid College of Computer Engineering and Sciences,
Artificial Neural Network, Decision Tree and Statistical Techniques Applied for Designing and Developing E-mail Classifier
International Journal of Recent Technology and Engineering (IJRTE) ISSN: 2277-3878, Volume-1, Issue-6, January 2013 Artificial Neural Network, Decision Tree and Statistical Techniques Applied for Designing
STANDARDISATION AND CLASSIFICATION OF ALERTS GENERATED BY INTRUSION DETECTION SYSTEMS
STANDARDISATION AND CLASSIFICATION OF ALERTS GENERATED BY INTRUSION DETECTION SYSTEMS Athira A B 1 and Vinod Pathari 2 1 Department of Computer Engineering,National Institute Of Technology Calicut, India
A Content based Spam Filtering Using Optical Back Propagation Technique
A Content based Spam Filtering Using Optical Back Propagation Technique Sarab M. Hameed 1, Noor Alhuda J. Mohammed 2 Department of Computer Science, College of Science, University of Baghdad - Iraq ABSTRACT
A Dynamic Flooding Attack Detection System Based on Different Classification Techniques and Using SNMP MIB Data
International Journal of Computer Networks and Communications Security VOL. 2, NO. 9, SEPTEMBER 2014, 279 284 Available online at: www.ijcncs.org ISSN 2308-9830 C N C S A Dynamic Flooding Attack Detection
A Review of Intrusion Detection Technique by Soft Computing and Data Mining Approach
A Review of Intrusion Detection Technique by Soft Computing and Data Mining Approach Aditya Shrivastava 1, Mukesh Baghel 2, Hitesh Gupta 3 Abstract The growth of internet technology spread a large amount
Index Terms: Intrusion Detection System (IDS), Training, Neural Network, anomaly detection, misuse detection.
Survey: Learning Techniques for Intrusion Detection System (IDS) Roshani Gaidhane, Student*, Prof. C. Vaidya, Dr. M. Raghuwanshi RGCER, Computer Science and Engineering Department, RTMNU University Nagpur,
ANALYSIS OF PAYLOAD BASED APPLICATION LEVEL NETWORK ANOMALY DETECTION
ANALYSIS OF PAYLOAD BASED APPLICATION LEVEL NETWORK ANOMALY DETECTION Like Zhang, Gregory B. White Department of Computer Science, University of Texas at San Antonio [email protected], [email protected]
KEITH LEHNERT AND ERIC FRIEDRICH
MACHINE LEARNING CLASSIFICATION OF MALICIOUS NETWORK TRAFFIC KEITH LEHNERT AND ERIC FRIEDRICH 1. Introduction 1.1. Intrusion Detection Systems. In our society, information systems are everywhere. They
Manjeet Kaur Bhullar, Kiranbir Kaur Department of CSE, GNDU, Amritsar, Punjab, India
Volume 5, Issue 6, June 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Multiple Pheromone
Data quality in Accounting Information Systems
Data quality in Accounting Information Systems Comparing Several Data Mining Techniques Erjon Zoto Department of Statistics and Applied Informatics Faculty of Economy, University of Tirana Tirana, Albania
Network Intrusion Detection using Semi Supervised Support Vector Machine
Network Intrusion Detection using Semi Supervised Support Vector Machine Jyoti Haweliya Department of Computer Engineering Institute of Engineering & Technology, Devi Ahilya University Indore, India ABSTRACT
International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2163 Volume 1 Issue 11 (November 2014)
Denial-of-Service Attack Detection Mangesh D. Salunke * Prof. Ruhi Kabra G.H.Raisoni CEM, SPPU, Ahmednagar HOD, G.H.Raisoni CEM, SPPU,Ahmednagar Abstract: A DoS (Denial of Service) attack as name indicates
Intrusion Detection via Machine Learning for SCADA System Protection
Intrusion Detection via Machine Learning for SCADA System Protection S.L.P. Yasakethu Department of Computing, University of Surrey, Guildford, GU2 7XH, UK. [email protected] J. Jiang Department
VISUALIZE NETWORK ANOMALY DETECTION BY USING K-MEANS CLUSTERING ALGORITHM
VISUALIZE NETWORK ANOMALY DETECTION BY USING K-MEANS CLUSTERING ALGORITHM A. M. Riad 1, Ibrahim Elhenawy 2,Ahmed Hassan 3 and Nancy Awadallah 1 1Faculty of Computer Science and Information Systems, Mansoura
Role of Anomaly IDS in Network
Role of Anomaly IDS in Network SumathyMurugan 1, Dr.M.Sundara Rajan 2 1 Asst. Prof, Department of Computer Science, Thiruthangal Nadar College, Chennai -51. 2 Asst. Prof, Department of Computer Science,
Intrusion Detection. Jeffrey J.P. Tsai. Imperial College Press. A Machine Learning Approach. Zhenwei Yu. University of Illinois, Chicago, USA
SERIES IN ELECTRICAL AND COMPUTER ENGINEERING Intrusion Detection A Machine Learning Approach Zhenwei Yu University of Illinois, Chicago, USA Jeffrey J.P. Tsai Asia University, University of Illinois,
EFFICIENT DATA PRE-PROCESSING FOR DATA MINING
EFFICIENT DATA PRE-PROCESSING FOR DATA MINING USING NEURAL NETWORKS JothiKumar.R 1, Sivabalan.R.V 2 1 Research scholar, Noorul Islam University, Nagercoil, India Assistant Professor, Adhiparasakthi College
REVIEW OF HEART DISEASE PREDICTION SYSTEM USING DATA MINING AND HYBRID INTELLIGENT TECHNIQUES
REVIEW OF HEART DISEASE PREDICTION SYSTEM USING DATA MINING AND HYBRID INTELLIGENT TECHNIQUES R. Chitra 1 and V. Seenivasagam 2 1 Department of Computer Science and Engineering, Noorul Islam Centre for
Evaluation of Feature Selection Methods for Predictive Modeling Using Neural Networks in Credits Scoring
714 Evaluation of Feature election Methods for Predictive Modeling Using Neural Networks in Credits coring Raghavendra B. K. Dr. M.G.R. Educational and Research Institute, Chennai-95 Email: [email protected]
International Journal of Computer Science Trends and Technology (IJCST) Volume 2 Issue 3, May-Jun 2014
RESEARCH ARTICLE OPEN ACCESS A Survey of Data Mining: Concepts with Applications and its Future Scope Dr. Zubair Khan 1, Ashish Kumar 2, Sunny Kumar 3 M.Tech Research Scholar 2. Department of Computer
Usefulness of DARPA Dataset for Intrusion Detection System Evaluation
Usefulness of DARPA Dataset for Intrusion Detection System Evaluation Ciza Thomas Vishwas Sharma N. Balakrishnan Indian Institute of Science, Bangalore, India ABSTRACT The MIT Lincoln Laboratory IDS evaluation
Conclusions and Future Directions
Chapter 9 This chapter summarizes the thesis with discussion of (a) the findings and the contributions to the state-of-the-art in the disciplines covered by this work, and (b) future work, those directions
Adaptive Layered Approach using Machine Learning Techniques with Gain Ratio for Intrusion Detection Systems
Adaptive Layered Approach using Machine Learning Techniques with Gain for Intrusion Detection Systems Heba Ezzat Ibrahim Arab Academy for Science, Technology and Maritime Transport Cairo, Egypt Sherif
Robust Preprocessing and Random Forests Technique for Network Probe Anomaly Detection
International Journal of Soft Computing and Engineering (IJSCE) Robust Preprocessing and Random Forests Technique for Network Probe Anomaly Detection G. Sunil Kumar, C.V.K Sirisha, Kanaka Durga.R, A.Devi
International Journal of Computer Trends and Technology (IJCTT) volume 4 Issue 8 August 2013
A Short-Term Traffic Prediction On A Distributed Network Using Multiple Regression Equation Ms.Sharmi.S 1 Research Scholar, MS University,Thirunelvelli Dr.M.Punithavalli Director, SREC,Coimbatore. Abstract:
An Evaluation of Machine Learning Method for Intrusion Detection System Using LOF on Jubatus
An Evaluation of Machine Learning Method for Intrusion Detection System Using LOF on Jubatus Tadashi Ogino* Okinawa National College of Technology, Okinawa, Japan. * Corresponding author. Email: [email protected]
An Introduction to Data Mining. Big Data World. Related Fields and Disciplines. What is Data Mining? 2/12/2015
An Introduction to Data Mining for Wind Power Management Spring 2015 Big Data World Every minute: Google receives over 4 million search queries Facebook users share almost 2.5 million pieces of content
Neural Networks and Support Vector Machines
INF5390 - Kunstig intelligens Neural Networks and Support Vector Machines Roar Fjellheim INF5390-13 Neural Networks and SVM 1 Outline Neural networks Perceptrons Neural networks Support vector machines
Performance Analysis of Naive Bayes and J48 Classification Algorithm for Data Classification
Performance Analysis of Naive Bayes and J48 Classification Algorithm for Data Classification Tina R. Patil, Mrs. S. S. Sherekar Sant Gadgebaba Amravati University, Amravati [email protected], [email protected]
Web Forensic Evidence of SQL Injection Analysis
International Journal of Science and Engineering Vol.5 No.1(2015):157-162 157 Web Forensic Evidence of SQL Injection Analysis 針 對 SQL Injection 攻 擊 鑑 識 之 分 析 Chinyang Henry Tseng 1 National Taipei University
An Efficient Way of Denial of Service Attack Detection Based on Triangle Map Generation
An Efficient Way of Denial of Service Attack Detection Based on Triangle Map Generation Shanofer. S Master of Engineering, Department of Computer Science and Engineering, Veerammal Engineering College,
Effective Analysis and Predictive Model of Stroke Disease using Classification Methods
Effective Analysis and Predictive Model of Stroke Disease using Classification Methods A.Sudha Student, M.Tech (CSE) VIT University Vellore, India P.Gayathri Assistant Professor VIT University Vellore,
A Software Implementation of a Genetic Algorithm Based Approach to Network Intrusion Detection
A Software Implementation of a Genetic Algorithm Based Approach to Network Intrusion Detection Ren Hui Gong, Mohammad Zulkernine, Purang Abolmaesumi School of Computing Queen s University Kingston, Ontario,
1. Classification problems
Neural and Evolutionary Computing. Lab 1: Classification problems Machine Learning test data repository Weka data mining platform Introduction Scilab 1. Classification problems The main aim of a classification
Neural Networks for Intrusion Detection and Its Applications
, July 3-5, 2013, London, U.K. Neural Networks for Intrusion Detection and Its Applications E.Kesavulu Reddy, Member IAENG Abstract: With rapid expansion of computer networks during the past decade, security
A Neural Network based Approach for Predicting Customer Churn in Cellular Network Services
A Neural Network based Approach for Predicting Customer Churn in Cellular Network Services Anuj Sharma Information Systems Area Indian Institute of Management, Indore, India Dr. Prabin Kumar Panigrahi
Classification algorithm in Data mining: An Overview
Classification algorithm in Data mining: An Overview S.Neelamegam #1, Dr.E.Ramaraj *2 #1 M.phil Scholar, Department of Computer Science and Engineering, Alagappa University, Karaikudi. *2 Professor, Department
The Integration of SNORT with K-Means Clustering Algorithm to Detect New Attack
The Integration of SNORT with K-Means Clustering Algorithm to Detect New Attack Asnita Hashim, University of Technology MARA, Malaysia April 14-15, 2011 The Integration of SNORT with K-Means Clustering
A Hybrid Data Mining Model to Improve Customer Response Modeling in Direct Marketing
A Hybrid Data Mining Model to Improve Customer Response Modeling in Direct Marketing Maryam Daneshmandi [email protected] School of Information Technology Shiraz Electronics University Shiraz, Iran
Development of a Network Intrusion Detection System
Development of a Network Intrusion Detection System (I): Agent-based Design (FLC1) (ii): Detection Algorithm (FLC2) Supervisor: Dr. Korris Chung Please visit my personal homepage www.comp.polyu.edu.hk/~cskchung/fyp04-05/
Artificial Intelligence and Machine Learning Models
Using Artificial Intelligence and Machine Learning Techniques. Some Preliminary Ideas. Presentation to CWiPP 1/8/2013 ICOSS Mark Tomlinson Artificial Intelligence Models Very experimental, but timely?
Finding Frequent Itemsets using Apriori Algorihm to Detect Intrusions in Large Dataset
Finding Frequent Itemsets using Apriori Algorihm to Detect Intrusions in Large Dataset Kamini Nalavade1, B.B. Meshram2, Abstract With the growth of hacking and exploiting tools and invention of new ways
Review Article Intrusion Detection Systems Based on Artificial Intelligence Techniques in Wireless Sensor Networks
Distributed Sensor Networks, Article ID 351047, 6 pages http://dx.doi.org/10.1155/2013/351047 Review Article Intrusion Detection Systems Based on Artificial Intelligence Techniques in Wireless Sensor Networks
Classification Algorithms in Intrusion Detection System: A Survey
Classification Algorithms in Intrusion Detection System: A Survey V. Jaiganesh 1 Dr. P. Sumathi 2 A.Vinitha 3 1 Doctoral Research Scholar, Department of Computer Science, Manonmaniam Sundaranar University,
A Neuro Fuzzy Based Intrusion Detection System for a Cloud Data Center Using Adaptive Learning
BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 15, No 3 Sofia 2015 Print ISSN: 1311-9702; Online ISSN: 1314-4081 DOI: 10.1515/cait-2015-0043 A Neuro Fuzzy Based Intrusion
Clustering on Large Numeric Data Sets Using Hierarchical Approach Birch
Global Journal of Computer Science and Technology Software & Data Engineering Volume 12 Issue 12 Version 1.0 Year 2012 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global
A Secured Approach to Credit Card Fraud Detection Using Hidden Markov Model
A Secured Approach to Credit Card Fraud Detection Using Hidden Markov Model Twinkle Patel, Ms. Ompriya Kale Abstract: - As the usage of credit card has increased the credit card fraud has also increased
A Review on Hybrid Intrusion Detection System using TAN & SVM
A Review on Hybrid Intrusion Detection System using TAN & SVM Sumalatha Potteti 1, Namita Parati 2 1 Assistant Professor, Department of CSE,BRECW,Hyderabad,India 2 Assistant Professor, Department of CSE,BRECW,Hyderabad,India
A Robust Method for Solving Transcendental Equations
www.ijcsi.org 413 A Robust Method for Solving Transcendental Equations Md. Golam Moazzam, Amita Chakraborty and Md. Al-Amin Bhuiyan Department of Computer Science and Engineering, Jahangirnagar University,
8. Machine Learning Applied Artificial Intelligence
8. Machine Learning Applied Artificial Intelligence Prof. Dr. Bernhard Humm Faculty of Computer Science Hochschule Darmstadt University of Applied Sciences 1 Retrospective Natural Language Processing Name
Internet Worm Classification and Detection using Data Mining Techniques
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 3, Ver. 1 (May Jun. 2015), PP 76-81 www.iosrjournals.org Internet Worm Classification and Detection
Electronic Payment Fraud Detection Techniques
World of Computer Science and Information Technology Journal (WCSIT) ISSN: 2221-0741 Vol. 2, No. 4, 137-141, 2012 Electronic Payment Fraud Detection Techniques Adnan M. Al-Khatib CIS Dept. Faculty of Information
D A T A M I N I N G C L A S S I F I C A T I O N
D A T A M I N I N G C L A S S I F I C A T I O N FABRICIO VOZNIKA LEO NARDO VIA NA INTRODUCTION Nowadays there is huge amount of data being collected and stored in databases everywhere across the globe.
A Review on Network Intrusion Detection System Using Open Source Snort
, pp.61-70 http://dx.doi.org/10.14257/ijdta.2016.9.4.05 A Review on Network Intrusion Detection System Using Open Source Snort Sakshi Sharma and Manish Dixit Department of CSE& IT MITS Gwalior, India [email protected],
AnalysisofData MiningClassificationwithDecisiontreeTechnique
Global Journal of omputer Science and Technology Software & Data Engineering Volume 13 Issue 13 Version 1.0 Year 2013 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals
