AN IMPLEMENTATION OF IDS IN A HYBRID APPROACH AND KDD CUP DATASET

Authors

  • Mala Bharti Lodhi CSE, LNCT Bhopal, India
  • Prof. Vineet Richhariya CSE, LNCT Bhopal, India
  • Prof. Mahesh Parmar CSE, LNCT Bhopal, India

DOI:

https://doi.org/10.29121/granthaalayah.v2.i3.2014.3055

Keywords:

IDS, Classification, KDD Cup 99’s, MATLAB, Hybrid Classification

Abstract [English]

Now in these days due to rapidly increasing network applications the data and privacy security in network is a key challenge. In order to provide effective and trustable security for network, intrusion detection systems are helpful. The presented study is based on the IDS system design for network based anomaly detection. Thus this system requires an efficient and appropriate classifier by which the detection rate of intrusions using KDD CPU dataset can be improved. Due to study there is various kind of data mining based, classification and pattern detection techniques are available. These techniques are promising for detecting network traffic pattern more accurately. On the other hand recently developed the hybrid models are providing more accurate classification. Thus a hybrid intrusion system is presented in this proposed work. That provides a significant solution even when the overall learning patterns are not available in database. Therefore, three different data mining algorithm is employed with system. Proposed system consists of K-mean clustering algorithm for finding the relationship among data in order to filter data instances. The implementation of the proposed classification system is performed using MATLAB environment and performance of designed classifier is evaluated. The obtained results from the simulation demonstrate after filtering steps. On the other hand the classification accuracy is adoptable with low number of training cycles with less time and space complexity.

Downloads

Download data is not yet available.

References

Hari Om, AritraKundu, “A Hybrid System for Reducing the False Alarm Rate of Anomaly Intrusion Detection System”, 1st Int’l Conf. on Recent Advances in Information Technology RAIT-2012, 978-1-4577-0697-4/12/$26.00 ©2012 IEEE

Gang Wang, Jinxing Hao, Jian Ma, Lihua Huang, “A new approach to intrusion detection using Artificial Neural Networks and fuzzy clustering”, 0957-4174, 2010 Elsevier Ltd. doi:10.1016/j.eswa.2010.02.102 DOI: https://doi.org/10.1016/j.eswa.2010.02.102

ManoranjanPradhan, Sateesh Kumar Pradhan, Sudhir Kumar Sahu, “Anomaly Detection using ArtificialNeural Network”, International Journal of Engineering Sciences & Emerging Technologies, April 2012, ISSN: 2231 – 6604 Volume 2, Issue 1, pp: 29-36 ©IJESET

Reyadh Shaker Naoum, NamhAbdulaAbid and ZainabNamh Al-Sultani, “An Enhanced Resilient Back propagation Artificial Neural Network for Intrusion Detection System”, IJCSNS International Journal of Computer Science and Network Security, VOL.12 No.3, March 2012, 11

Vladimir Bukhtoyarov, Eugene Semenkin, “Neural Networks Ensemble Approach for Detecting Attacks in Computer Networks”, WCCI 2012 IEEE World Congress on Computational Intelligence June, 10-15, 2012 - Brisbane, Australia DOI: https://doi.org/10.1109/CEC.2012.6252986

Xiao Hang Yao, “A Network Intrusion Detection Approach combined with Genetic Algorithm and Back Propagation Neural Network”, 2010 International Conference on E-Health Networking, Digital Ecosystems and Technologies, 978-1-4244-5517-1/10/$26.00 ©201O IEEE

Sufyan T. Faraj, Al-Janabi and HadeelAmjedSaeed, “A Neural Network Based Anomaly Intrusion Detection System”, 2011 Developments in E- systems Engineering, 978-0-7695-4593-6/11 $26.00 © 2011 IEEE, DOI 10.1109/DeSE.2011.19

XiaoHangYyao “A Network Intrusion Detection Approach combined with Genetic Algorithm and Back Propagation Neural Network” 2010 International Conference on E-Health Networking, Digital Ecosystems and Technologies DOI: https://doi.org/10.1109/EDT.2010.5496548

Qinglei Zhang” Network Intrusion Detection by Support Vectors and Ant Colony” Proceedings of the 2009 International Workshop on Information Security and Application (IWISA 2009)Qingdao, China, November 21-22, 2009

M. Sadiq Ali Khan” Rule based Network Intrusion Detection using Genetic Algorithm” International Journal of Computer Applications (0975 – 8887) Volume 18– No.8, March 2011 DOI: https://doi.org/10.5120/2303-2914

Prof. Mrs. N. S. Chandolikar” Efficient Algorithm for Intrusion Attack Classification by Analyzing KDD Cup 99” 2012 IEEE DOI: https://doi.org/10.1109/WOCN.2012.6335546

Noreen Kausar “An Approach towards Intrusion Detection using PCA Feature Subsets and SVM” 2012 lEEEUniversitiTeknologi PETRONAS, Bandar Seri Iskandar, 31750 Tronoh, Perak, Malaysia 2012 International Conference on Computer & Information Science (ICCIS) DOI: https://doi.org/10.1109/ICCISci.2012.6297095

Downloads

Published

2014-12-31

How to Cite

Lodhi, M. B., Richhariya, V., & Parmar, M. (2014). AN IMPLEMENTATION OF IDS IN A HYBRID APPROACH AND KDD CUP DATASET. International Journal of Research -GRANTHAALAYAH, 2(3), 1–9. https://doi.org/10.29121/granthaalayah.v2.i3.2014.3055