Skyline computation for improving naïve Bayesian classifier in intrusion detection system

被引:0
作者
Alem A. [1 ]
Dahmani Y. [2 ]
Mebarek B. [3 ]
机构
[1] Ecole Superieure Nationale d’Informatique, ESI, BP 68 M, Oued Smar Algiers
[2] University of Tiaret, EECE Lab, BP 78 Zaaroura, Tiaret
[3] Research Laboratory of Industrial Technologies, University of Tiaret
来源
Ingenierie des Systemes d'Information | 2019年 / 24卷 / 05期
关键词
Intrusion detection system; Naïve Bayesian network; Network security; Skyline operator;
D O I
10.18280/isi.240508
中图分类号
学科分类号
摘要
Intrusion detection systems (IDSs) are critical to network security. However, there are some common defects with the existing IDSs, namely, low detection rate of rare attacks and high number of false alarms. Many have suggested solving these defects by integrating different IDSs techniques, but the effectiveness has not been justified. This paper puts forward a two-layer hybrid IDS based on Skyline operator and Naïve Bayesian classifier. First, the most suitable classifier was identified through Skyline computation based on three criteria, namely, accuracy, detection rate and false alarm rate. Then, the results were integrated by the Naïve Bayesian classifier into the final decision. To verify its effectiveness, the proposed IDS was tested on the famous KDD dataset. The results show that our system greatly improves the detection rate of rare attack, while decreasing false alarms rate, from the levels of the previous techniques. © 2019 International Information and Engineering Technology Association. All rights reserved.
引用
收藏
页码:513 / 518
页数:5
相关论文
共 25 条
  • [1] Evangelista T., Les IDS: Les Systèmes De Détection D’Intrusions Informatiques, (2004)
  • [2] Wu S.X., Banzhaf W., The use of computational intelligence in intrusion detection systems., A Review, Applied Soft Computing, 10, 1, pp. 1-35, (2010)
  • [3] Scott S.L., A Bayesian paradigm for designing intrusion detection systems, Computational Statistics & Data Analysis, 45, 1, pp. 69-83, (2004)
  • [4] Ben-Amor N., Benferhat S., Elouedi Z., Naive Bayes vs decision trees in intrusion detection systems, Proceedings of the 2004 ACM Symposium on Applied Computing, pp. 420-424, (2004)
  • [5] Mukkamala S., Janoski G., Sung A., Intrusion detection using neural networks and support vector machines, Proceedings of the 2002 International Joint Conference on Neural Networks. IJCNN'02 (Cat. No.02CH37290, pp. 1702-1707, (2002)
  • [6] Zhang Z., Shen H., Application of online-training SVMs for real-time intrusion detection with different considerations, Computer Communications, 28, 12, pp. 1428-1442, (2005)
  • [7] Paek S.H., Oh Y.K., Lee D.H., SIDMG: Small-size intrusion detection model generation of complimenting decision tree classification algorithm, International Workshop on Information Security Applications, pp. 83-99, (2006)
  • [8] Borzsony S., Kossmann D., Stocker K., The skyline operator, Proceedings 17th International Conference on Data Engineering, pp. 421-430, (2001)
  • [9] Kung H.T., Luccio F., Preparata F.P., On finding the maxima of a set of vectors, Journal of the ACM (JACM), 22, 4, pp. 469-476, (1975)
  • [10] Pearl J., Probabilistic Reasoning in Intelligent Systems: Networks of Plausible Reasoning, (1988)