A Data Mining Approach for Intrusion Detection in a Computer Network
DOI:
https://doi.org/10.51983/ajcst-2019.8.S1.1942Keywords:
Intrusion Detection System, Ensemble, Stacking, Network Attacks, Data MiningAbstract
As activities being done on the internet keep expanding every day due to the fact that we are in the era of the information age, securing sensitive and crucial data on computer networks against malicious attacks tends to be a challenging issue. Designing effective Intrusion Detection Systems (IDSs) with maximized accuracy and low rate of false alarms is an imperative need in the world of cyber-attacks. This work was designed to employ an ensemble data mining technique for improving IDSs by carrying out some experiments using the KDD 99 intrusion dataset. Dataset was fragmented into five, representing the major categories of attacks: Normal, DOS (Denial of Service), Probing (Information gathering), R2L (Remote to Local) and U2R (User to Root). An ensemble classifier using the Stacking method with the Naïve Bayes and Multilayer perceptron algorithms as the base classifiers and J48 as the meta learner was developed. The base classifiers were also employed on the dataset individually, and performance comparison was done between individual classifiers and the ensemble classifier. A 10-fold cross validation for training and testing of data and Gain ratio technique for filtering of the dataset was adopted. Ensemble classifier maximized accuracy the most and helped in reduction of false positives of the U2R attack type.
References
R. C. Summers, "Secure computing: threats and safeguards," New York: McGraw Hill, 1997.
A. Mounji, "Languages and Tools for Rule Based Distributed Intrusion Detection," PhD Thesis, Faculties Universalities Notre-Dame de la Paix Namur, 1997.
G. V. Nadiammai, S. Krishaveni, M. Hemalatha, "A comprehensive Analysis and study in intrusion detection system using data mining Techniques," IJCA, vol. 35, no. 8, 2011.
A. Youssef and A. Emam, "Network intrusion detection using data mining and network behavior," International Journal of Computer Science & Information Technology, IJCSIT, vol. 3, no. 6, 2011.
Iwan, Syarif Ed, Zaluska, Adam Prugel-Bennett, Gary Wills, "Application of Bagging, Boosting and Stacking to Intrusion Detection," School of Electronics and Computer Science, University of Southampton, UK, 2012.
H. Zhao, "Intrusion Detection Ensemble Algorithm based on Bagging and Neighbourhood Rough Set," International Journal of Security and Its Applications, vol. 7, no. 5, pp. 193-204, 2014.
T. Subbulakshmi, A. Ramamoorthi, and S. M. Shalinie, "Ensemble design for intrusion detection systems," International Journal of Computer Science & Information Technology, IJCSIT, vol. 1, no. 1, 2009.
S. Singh and Sanjay, "An ensemble approaches for feature selection of Cyber Attack Dataset," International Journal of Computer Science and Information Security IJCSIS, vol. 6, no. 2, 2009.
A. Borji, "Combining Heterogeneous Classifiers for Network Intrusion Detection," in ASIAN 2007, LNCS 4846, pp. 254-260, © Springer-Verlag Berlin Heidelberg, 2007.
M. Govindarajan and R. M. Chandrasekaran, "Intrusion Detection using an Ensemble of Classification Methods," Proceedings of the World Congress on Engineering and Computer Science, San Francisco, USA, WCECS, vol. 1, October 24-26, 2012.
H. Ibrahim, M. Badr, A. Shaheen, "Adaptive Layered Approach using Machine Learning Techniques with Gain Ratio for Intrusion Detection Systems," International Journal of Computer Applications, vol. 56, no. 7, 2012.
Yimin Wu, "High–dimensional Pattern Analysis in Multimedia Information Retrieval and Bioinformatics," Doctoral Thesis, State University of New York, January 2004.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2019 The Research Publication
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.