AN IMPLEMENTATION OF IDS IN A HYBRID APPROACH AND KDD CUP DATASET
DOI:
https://doi.org/10.29121/granthaalayah.v2.i3.2014.3055Keywords:
IDS, Classification, KDD Cup 99’s, MATLAB, Hybrid ClassificationAbstract [English]
Now in these days due to rapidly increasing network applications the data and privacy security in network is a key challenge. In order to provide effective and trustable security for network, intrusion detection systems are helpful. The presented study is based on the IDS system design for network based anomaly detection. Thus this system requires an efficient and appropriate classifier by which the detection rate of intrusions using KDD CPU dataset can be improved. Due to study there is various kind of data mining based, classification and pattern detection techniques are available. These techniques are promising for detecting network traffic pattern more accurately. On the other hand recently developed the hybrid models are providing more accurate classification. Thus a hybrid intrusion system is presented in this proposed work. That provides a significant solution even when the overall learning patterns are not available in database. Therefore, three different data mining algorithm is employed with system. Proposed system consists of K-mean clustering algorithm for finding the relationship among data in order to filter data instances. The implementation of the proposed classification system is performed using MATLAB environment and performance of designed classifier is evaluated. The obtained results from the simulation demonstrate after filtering steps. On the other hand the classification accuracy is adoptable with low number of training cycles with less time and space complexity.
Downloads
References
Hari Om, AritraKundu, “A Hybrid System for Reducing the False Alarm Rate of Anomaly Intrusion Detection System”, 1st Int’l Conf. on Recent Advances in Information Technology RAIT-2012, 978-1-4577-0697-4/12/$26.00 ©2012 IEEE
Gang Wang, Jinxing Hao, Jian Ma, Lihua Huang, “A new approach to intrusion detection using Artificial Neural Networks and fuzzy clustering”, 0957-4174, 2010 Elsevier Ltd. doi:10.1016/j.eswa.2010.02.102 DOI: https://doi.org/10.1016/j.eswa.2010.02.102
ManoranjanPradhan, Sateesh Kumar Pradhan, Sudhir Kumar Sahu, “Anomaly Detection using ArtificialNeural Network”, International Journal of Engineering Sciences & Emerging Technologies, April 2012, ISSN: 2231 – 6604 Volume 2, Issue 1, pp: 29-36 ©IJESET
Reyadh Shaker Naoum, NamhAbdulaAbid and ZainabNamh Al-Sultani, “An Enhanced Resilient Back propagation Artificial Neural Network for Intrusion Detection System”, IJCSNS International Journal of Computer Science and Network Security, VOL.12 No.3, March 2012, 11
Vladimir Bukhtoyarov, Eugene Semenkin, “Neural Networks Ensemble Approach for Detecting Attacks in Computer Networks”, WCCI 2012 IEEE World Congress on Computational Intelligence June, 10-15, 2012 - Brisbane, Australia DOI: https://doi.org/10.1109/CEC.2012.6252986
Xiao Hang Yao, “A Network Intrusion Detection Approach combined with Genetic Algorithm and Back Propagation Neural Network”, 2010 International Conference on E-Health Networking, Digital Ecosystems and Technologies, 978-1-4244-5517-1/10/$26.00 ©201O IEEE
Sufyan T. Faraj, Al-Janabi and HadeelAmjedSaeed, “A Neural Network Based Anomaly Intrusion Detection System”, 2011 Developments in E- systems Engineering, 978-0-7695-4593-6/11 $26.00 © 2011 IEEE, DOI 10.1109/DeSE.2011.19
XiaoHangYyao “A Network Intrusion Detection Approach combined with Genetic Algorithm and Back Propagation Neural Network” 2010 International Conference on E-Health Networking, Digital Ecosystems and Technologies DOI: https://doi.org/10.1109/EDT.2010.5496548
Qinglei Zhang” Network Intrusion Detection by Support Vectors and Ant Colony” Proceedings of the 2009 International Workshop on Information Security and Application (IWISA 2009)Qingdao, China, November 21-22, 2009
M. Sadiq Ali Khan” Rule based Network Intrusion Detection using Genetic Algorithm” International Journal of Computer Applications (0975 – 8887) Volume 18– No.8, March 2011 DOI: https://doi.org/10.5120/2303-2914
Prof. Mrs. N. S. Chandolikar” Efficient Algorithm for Intrusion Attack Classification by Analyzing KDD Cup 99” 2012 IEEE DOI: https://doi.org/10.1109/WOCN.2012.6335546
Noreen Kausar “An Approach towards Intrusion Detection using PCA Feature Subsets and SVM” 2012 lEEEUniversitiTeknologi PETRONAS, Bandar Seri Iskandar, 31750 Tronoh, Perak, Malaysia 2012 International Conference on Computer & Information Science (ICCIS) DOI: https://doi.org/10.1109/ICCISci.2012.6297095
Downloads
Published
How to Cite
Issue
Section
License
With the licence CC-BY, authors retain the copyright, allowing anyone to download, reuse, re-print, modify, distribute, and/or copy their contribution. The work must be properly attributed to its author.
It is not necessary to ask for further permission from the author or journal board.
This journal provides immediate open access to its content on the principle that making research freely available to the public supports a greater global exchange of knowledge.