Fusion of Misuse Detection with Anomaly Detection Technique for Novel Hybrid Network Intrusion Detection System

被引:3
|
作者
Hussain, Jamal [1 ]
Lalmuanawma, Samuel [1 ]
机构
[1] Mizoram Univ, Math & Comp Sci Dept, Aizawl 796004, Mizoram, India
关键词
Hybrid IDS; Feature selection; Naive Bayes classifier; Decision tree; One-class SVM; FEATURE-SELECTION; SUPPORT;
D O I
10.1007/978-981-10-3779-5_10
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Intrusion detection system (IDS) was designed to monitor the abnormal activity occurring in the computer network system. Many researchers concentrate their efforts on designing different techniques to build reliable IDS. However, individual technique such as misuse and anomaly techniques alone failed to provide the best possible detection rate. In this paper, we proposed a new hybrid IDS model with feature selection that integrates misuse detection technique and anomaly detection technique based on a decision rule structure. The key idea was to take the advantage of naive Bayes (NB) feature selection, misuse detection technique based on decision tree (DT), and anomaly detection based on one-class support vector machine (OCSVM). First, misuse detection is built using single DT algorithm where the training data get decomposed into multiple subsets with the help of decision rules. Then, anomaly detection models are created for each decomposed subset based on multiple OCSVM. In the proposed model, NB and DT can find the best-selected features to ameliorate the detection accuracy by obtaining decision rules for known normal and attack anomalies. Then, the OCSVM can detect new attacks that result in an improvement in the detection accuracy of classification. The proposed new hybrid model was evaluated based on the NSL-KDD data sets, which is an upgraded version of KDD99 data set developed by DARPA. Simulation results demonstrate that the proposed hybrid model outperforms conventional models in terms of time complexity and detection rate with the much lower rate of false positives.
引用
收藏
页码:73 / 87
页数:15
相关论文
共 50 条
  • [41] Fusions of GA and SVM for anomaly detection in intrusion detection system
    Kim, DS
    Nguyen, HN
    Ohn, SY
    Park, JS
    ADVANCES IN NEURAL NETWORKS - ISNN 2005, PT 3, PROCEEDINGS, 2005, 3498 : 415 - 420
  • [42] Anomaly Detection on Intrusion Detection System Using CLIQUE Partitioning
    Nastaiinullah, N.
    Adiwijaya
    Kurniati, A. P.
    2014 2ND INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY (ICOICT), 2014,
  • [43] Hurst Parameter based Anomaly Detection for Intrusion Detection System
    Yu, Song Jin
    Koh, Pauline
    Kwon, Hyukmin
    Kim, Dong Seong
    Kim, Huy Kang
    2016 IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY (CIT), 2016, : 234 - 240
  • [44] Anomaly detection based Intrusion Detection
    Novikov, Dima
    Yampolskiy, Roman V.
    Reznik, Leon
    THIRD INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: NEW GENERATIONS, PROCEEDINGS, 2006, : 420 - +
  • [45] RESEARCH OF A HYBRID DISTRIBUTED NETWORK INTRUSION DETECTION SYSTEM
    Li, Qin
    Yan, Danfeng
    Yang, Fangchun
    CIICT 2008: PROCEEDINGS OF CHINA-IRELAND INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATIONS TECHNOLOGIES 2008, 2008, : 301 - 305
  • [46] Intrusion Detection System (IDS): Anomaly Detection using Outlier Detection Approach
    Jabez, J.
    Muthukumar, B.
    INTERNATIONAL CONFERENCE ON COMPUTER, COMMUNICATION AND CONVERGENCE (ICCC 2015), 2015, 48 : 338 - 346
  • [47] A hybrid network intrusion detection technique using random forests
    Zhang, Jiong
    Zulkernine, Mohammad
    FIRST INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, PROCEEDINGS, 2006, : 262 - +
  • [48] Hybrid Intrusion Detection System
    Adhao, Rahul B.
    Mahefuj, Samadhan J.
    Pachghare, Vinod K.
    Khadse, Vijay M.
    INTERNATIONAL JOURNAL OF NEXT-GENERATION COMPUTING, 2021, 12 (05): : 573 - 579
  • [49] Network Intrusion Detection Using Machine Learning Anomaly Detection Algorithms
    Hanifi, Khadija
    Bank, Hasan
    Karsligil, M. Elif
    Yavuz, A. Gokhan
    Guvensan, M. Amac
    2017 25TH SIGNAL PROCESSING AND COMMUNICATIONS APPLICATIONS CONFERENCE (SIU), 2017,
  • [50] Anomaly-Based Network Intrusion Detection: An Outlier Detection Techniques
    Kumar, Neeraj
    Kumar, Upendra
    PROCEEDINGS OF THE EIGHTH INTERNATIONAL CONFERENCE ON SOFT COMPUTING AND PATTERN RECOGNITION (SOCPAR 2016), 2018, 614 : 262 - 269