Classification of Intrusion Detection System (IDS) Based on Computer Network

被引:0
|
作者
Effendy, David Ahmad [1 ]
Kusrini, Kusrini [1 ]
Sudarmawan, Sudarmawan [2 ]
机构
[1] AMIKOM Yogyakarta Univ, Master Program Informat Engn, Jl Ringrd Utara Condong Catur, Depok Sleman 55283, Yogyakarta, Indonesia
[2] AMIKOM Yogyakarta Univ, Dept Comp Sci, Jl Ringrd Utara Condong Catur, Depok Sleman 55283, Yogyakarta, Indonesia
关键词
ids; k-means clustering; fitur selection; naivebayes;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Intrusion Detection System (IDS) is made as one of the solutions to handle security issues on the network in order to remain assured free of attack. IDS's work is developed by 2 models that using signature-based detection, how it works is limited to the pattern of attack behavior that has been defined in the database. The next is the Anomaly-based IDS model. It works by detects unusual activity of network in the normal conditions, but this model gives a lot of false positiv messages. Several previous studies have shown that the IDS approach with machine learning techniques can provide high accuracy results. The first step that must be done in the application of mechine learning technique is preprocessing the selection of features / attributes to optimize the performance of learning algorithms. In this study, intrusion detection system with mechine learning classification technique is proposed by using naivebayes algorithm with NSL-KDD dataset. The processes in this reseach start from normalization of data, discretization features continuous variables with k-means method and the selection of features using Information Gain algorithm. The result of this reseach shows that the application of k-means clustering method for continuous variabe discretization and feature selection can optimize the performance of naivebayes algorithm in classifying intrusion types.
引用
收藏
页码:90 / 94
页数:5
相关论文
共 50 条
  • [21] An intelligent lightweight intrusion detection system(IDS)
    Hu, ZB
    Shirochin, VP
    Yang, YP
    Eurocon 2005: The International Conference on Computer as a Tool, Vol 1 and 2 , Proceedings, 2005, : 652 - 655
  • [22] NL-IDS: Trust Based Intrusion Detection System for Network layer in Wireless Sensor Networks
    Ghugar, Umashankar
    Pradhan, Jayaram
    2018 FIFTH INTERNATIONAL CONFERENCE ON PARALLEL, DISTRIBUTED AND GRID COMPUTING (IEEE PDGC), 2018, : 512 - 516
  • [23] GE-IDS: an intrusion detection system based on grayscale and entropy
    Liao, Dan
    Zhou, Ruijin
    Li, Hui
    Zhang, Ming
    Chen, Xue
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2022, 15 (03) : 1521 - 1534
  • [24] A novel intrusion detection system for a local computer network
    Tokhtabayev, A.
    Altaibek, A.
    Skormin, V.
    Tukeyev, U.
    COMPUTER NETWORK SECURITY, PROCEEDINGS, 2007, 1 : 320 - +
  • [25] A decisional framework system for computer network intrusion detection
    Fessi, B. A.
    Hamdi, M.
    Benabdallah, S.
    Boudriga, N.
    EUROPEAN JOURNAL OF OPERATIONAL RESEARCH, 2007, 177 (03) : 1824 - 1838
  • [26] Research and Design of Intrusion Detection System in Computer Network
    Zhang, Xiaohui
    PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON SOCIAL SCIENCE AND TECHNOLOGY EDUCATION (ICSSTE 2015), 2015, 18 : 390 - 392
  • [27] Trans-IDS: A Transformer-Based Intrusion Detection System
    Mercha, El Mahdi
    Chakir, El Mostapha
    Erradi, Mohammed
    PROCEEDINGS OF THE 20TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, SECRYPT 2023, 2023, : 402 - 409
  • [28] GE-IDS: an intrusion detection system based on grayscale and entropy
    Dan Liao
    Ruijin Zhou
    Hui Li
    Ming Zhang
    Xue Chen
    Peer-to-Peer Networking and Applications, 2022, 15 : 1521 - 1534
  • [29] A novel hybrid intrusion detection system (Ids) for the detection of internet of things (IoT) network attacks
    Ramadan R.A.
    Yadav K.
    Annals of Emerging Technologies in Computing, 2020, 4 (05) : 61 - 74
  • [30] Difference between Intrusion Detection System (IDS) and Intrusion Prevention System (IPS)
    Ashoor, Asmaa Shaker
    Gore, Sharad
    ADVANCES IN NETWORK SECURITY AND APPLICATIONS, 2011, 196 : 497 - +