Fusion of Misuse Detection with Anomaly Detection Technique for Novel Hybrid Network Intrusion Detection System

被引:3
|
作者
Hussain, Jamal [1 ]
Lalmuanawma, Samuel [1 ]
机构
[1] Mizoram Univ, Math & Comp Sci Dept, Aizawl 796004, Mizoram, India
关键词
Hybrid IDS; Feature selection; Naive Bayes classifier; Decision tree; One-class SVM; FEATURE-SELECTION; SUPPORT;
D O I
10.1007/978-981-10-3779-5_10
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Intrusion detection system (IDS) was designed to monitor the abnormal activity occurring in the computer network system. Many researchers concentrate their efforts on designing different techniques to build reliable IDS. However, individual technique such as misuse and anomaly techniques alone failed to provide the best possible detection rate. In this paper, we proposed a new hybrid IDS model with feature selection that integrates misuse detection technique and anomaly detection technique based on a decision rule structure. The key idea was to take the advantage of naive Bayes (NB) feature selection, misuse detection technique based on decision tree (DT), and anomaly detection based on one-class support vector machine (OCSVM). First, misuse detection is built using single DT algorithm where the training data get decomposed into multiple subsets with the help of decision rules. Then, anomaly detection models are created for each decomposed subset based on multiple OCSVM. In the proposed model, NB and DT can find the best-selected features to ameliorate the detection accuracy by obtaining decision rules for known normal and attack anomalies. Then, the OCSVM can detect new attacks that result in an improvement in the detection accuracy of classification. The proposed new hybrid model was evaluated based on the NSL-KDD data sets, which is an upgraded version of KDD99 data set developed by DARPA. Simulation results demonstrate that the proposed hybrid model outperforms conventional models in terms of time complexity and detection rate with the much lower rate of false positives.
引用
收藏
页码:73 / 87
页数:15
相关论文
共 50 条
  • [21] Anomaly intrusion detection system based on neural network
    Li, Yuan-Bing
    Fang, Ding-Yi
    Wu, Xiao-Nan
    Chen, Xiao-Jiang
    Xi Tong Gong Cheng Yu Dian Zi Ji Shu/Systems Engineering and Electronics, 2005, 27 (09): : 1648 - 1651
  • [22] Anomaly-Based Network Intrusion Detection System
    Villalba, L. J. G.
    Orozco, A. L. S.
    Vidal, J. M.
    IEEE LATIN AMERICA TRANSACTIONS, 2015, 13 (03) : 850 - 855
  • [23] Network Intrusion Detection System using 2D Anomaly Detection
    Kim, Mm Seok
    Shin, Jong Hoon
    Hong, Choong Seon
    2022 23RD ASIA-PACIFIC NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM (APNOMS 2022), 2022, : 271 - 274
  • [24] Misuse Detection via a Novel Hybrid System
    Foroughifar, Ali
    Abadeh, Mohammad S.
    Momenzadeh, A.
    Pouyan, Maziyar Baran
    2009 THIRD UKSIM EUROPEAN SYMPOSIUM ON COMPUTER MODELING AND SIMULATION (EMS 2009), 2009, : 11 - +
  • [25] A novel hybrid intrusion detection system (Ids) for the detection of internet of things (IoT) network attacks
    Ramadan R.A.
    Yadav K.
    Annals of Emerging Technologies in Computing, 2020, 4 (05) : 61 - 74
  • [26] Hybrid intrusion detection system for complicated network
    Zhang, Baojun
    Pan, Xuezeng
    Wang, Jiebing
    FOURTH INTERNATIONAL CONFERENCE ON FUZZY SYSTEMS AND KNOWLEDGE DISCOVERY, VOL 4, PROCEEDINGS, 2007, : 251 - +
  • [27] A NOVEL ANOMALY-NETWORK INTRUSION DETECTION SYSTEM USING ABC ALGORITHMS
    Bae, Changseok
    Yeh, Wei-Chang
    Shukran, Mohd Afizi Mohd
    Chung, Yuk Ying
    Hsieh, Tsung-Jung
    INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2012, 8 (12): : 8231 - 8248
  • [28] The sound of intrusion: A novel network intrusion detection system
    Aldarwbi, Mohammed Y.
    Lashkari, Arash H.
    Ghorbani, Ali A.
    COMPUTERS & ELECTRICAL ENGINEERING, 2022, 104
  • [29] Anomaly-Based Network Intrusion Detection System through Feature Selection and Hybrid Machine Learning Technique
    Pattawaro, Apichit
    Polprasert, Chantri
    2018 16TH INTERNATIONAL CONFERENCE ON ICT AND KNOWLEDGE ENGINEERING (ICT&KE), 2018, : 64 - 69
  • [30] PGAN:A Generative Adversarial Network based Anomaly Detection Method for Network Intrusion Detection System
    Li, Zeyi
    Wang, Yun
    Wang, Pan
    Su, Haorui
    2021 IEEE 20TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2021), 2021, : 734 - 741