Bayesian Classifiers in Intrusion Detection Systems

被引:0
|
作者
Johan, Mardini-Bovea [1 ,2 ]
Emiro, De-La-Hoz-Franco [3 ]
Diego, Molina-Estren [3 ]
Ariza-Colpas, Paola [3 ]
Andres, Ortiz [4 ]
Julio, Ortega [5 ]
Cardenas, Cesar A. R. [6 ]
Collazos-Morales, Carlos [6 ]
机构
[1] Univ Costa, Barranquilla, Colombia
[2] Univ Atlantico, Barranquilla, Colombia
[3] Univ Costa, Comp Sci & Elect Dept, Res Grp Software Engn & Networks, Barranquilla, Colombia
[4] Univ Malaga, Commun Engn Dept, Malaga, Spain
[5] Univ Granada, Comp Architecture & Technol Dept, CITIC, Granada, Spain
[6] Univ Manuela Beltran, Vicerrectoria Invest, Bogota, Colombia
来源
关键词
Naive Bayes; Bayesian networks; Feature selection; IDS;
D O I
10.1007/978-3-030-45778-5_26
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
To be able to identify computer attacks, detection systems that are based on faults are not dependent on data base upgrades unlike the ones based on misuse. The first type of systems mentioned generate a knowledge pattern from which the usual and unusual traffic is distinguished. Within computer networks, different classification traffic techniques have been implemented in intruder detection systems based on abnormalities. These try to improve the measurement that assess the performance quality of classifiers and reduce computational cost. In this research work, a comparative analysis of the obtained results is carried out after implementing different selection techniques such as Info.Gain, Gain ratio and Relief as well as Bayesian (Naive Bayes and Bayesians Networks). Hence, 97.6% of right answers were got with 13 features. Likewise, through the implementation of both load balanced methods and attributes normalization and choice, it was also possible to diminish the number of features used in the ID classification process. Also, a reduced computational expense was achieved.
引用
收藏
页码:379 / 391
页数:13
相关论文
共 50 条
  • [1] Intelligent Bayesian classifiers in network intrusion detection
    Bosin, A
    Dessì, N
    Pes, B
    [J]. INNOVATIONS IN APPLIED ARTIFICIAL INTELLIGENCE, 2005, 3533 : 445 - 447
  • [2] Bayesian Model Averaging of Bayesian Network Classifiers for Intrusion Detection
    Xiao, Liyuan
    Chen, Yetian
    Chang, Carl K.
    [J]. 2014 38TH ANNUAL IEEE INTERNATIONAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE WORKSHOPS (COMPSACW 2014), 2014, : 128 - 133
  • [3] Comparing Single and Multiple Bayesian Classifiers Approaches for Network Intrusion Detection
    Khor, Kok-Chin
    Ting, Choo-Yee
    Amnuaisuk, Somnuk-Phon
    [J]. 2010 SECOND INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING AND APPLICATIONS: ICCEA 2010, PROCEEDINGS, VOL 2, 2010, : 325 - 329
  • [4] Online Intrusion Detection for Internet of Things Systems With Full Bayesian Possibilistic Clustering and Ensembled Fuzzy Classifiers
    Li, Fang-Qi
    Zhao, Rui-Jie
    Wang, Shi-Lin
    Chen, Li-Bo
    Liew, Alan Wee-Chung
    Ding, Weiping
    [J]. IEEE TRANSACTIONS ON FUZZY SYSTEMS, 2022, 30 (11) : 4605 - 4617
  • [5] A Bayesian paradigm for designing intrusion detection systems
    Scott, SL
    [J]. COMPUTATIONAL STATISTICS & DATA ANALYSIS, 2004, 45 (01) : 69 - 83
  • [6] A survey of intrusion detection systems based on ensemble and hybrid classifiers
    Aburomman, Abdulla Amin
    Reaz, Mamun Bin Ibne
    [J]. COMPUTERS & SECURITY, 2017, 65 : 135 - 152
  • [7] A Novel Framework, Based on Fuzzy Ensemble of Classifiers for Intrusion Detection Systems
    Masarat, Saman
    Taheri, Hassan
    Sharifian, Saeed
    [J]. 2014 4TH INTERNATIONAL CONFERENCE ON COMPUTER AND KNOWLEDGE ENGINEERING (ICCKE), 2014, : 165 - 170
  • [8] Markov chains, classifiers, and intrusion detection
    Jha, S
    Tan, K
    Maxion, RA
    [J]. 14TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 2001, : 206 - 219
  • [9] Best hybrid classifiers for intrusion detection
    Kholfi, Sanaa
    Habib, Muhammad
    Aljahdali, Sultan
    [J]. JOURNAL OF COMPUTATIONAL METHODS IN SCIENCES AND ENGINEERING, 2006, 6 (5-6) : S299 - S307
  • [10] Analysis of distributed intrusion detection systems using Bayesian methods
    Burroughs, DJ
    Wilson, LF
    Cybenko, GV
    [J]. CONFERENCE PROCEEDINGS OF THE 2002 IEEE INTERNATIONAL PERFORMANCE, COMPUTING, AND COMMUNICATIONS CONFERENCE, 2002, : 329 - 334