A new adaptive intrusion detection system based on the intersection of two different classifiers

被引:10
作者
Ahmim, A. [1 ]
Ghoualmi-Zine, N. [1 ]
机构
[1] Laboratory of Computer Networks and Systems, Department of Computer Science, Badji Mokhtar-Annaba University, Annaba
关键词
Fuzzy unordered rule induction algorithm; Hierarchical IDS; Hybrid IDS; IDS; Intrusion detection system; Random forests;
D O I
10.1504/IJSN.2014.065710
中图分类号
学科分类号
摘要
Nowadays, the intrusion detection system (IDS) has become one of the most important weapons against cyber-attacks. The simple single-level IDS cannot detect both attack types and normal behaviour with high detection rate. To overcome this limit, we propose a new approach for intrusion detection. The idea of this paper is to use two different classifiers iteratively, where each-iteration represents one level in the built model. To ensure the adaptation of our model, we add a new level whenever the sum of new attacks and the rest of the training dataset reaches the threshold. To build our model, we have used Fuzzy Unordered Rule Induction Algorithm and Random Forests as classifiers. The experiment on the KDD99 dataset shows the high performance of our model that demonstrates its ability to detect the low frequent attack without losing their high performance in the detection of frequent attack and normal behaviour. Furthermore, our model gives the highest detection rate and the highest accuracy, compared with some models well known in the literature related to intrusion detection. Copyright © 2014 Inderscience Enterprises Ltd.
引用
收藏
页码:125 / 132
页数:7
相关论文
共 26 条
[21]  
Xiang C., Chong M.Y., Zhu H.L., Design of multiplelevel tree classifiers for intrusion detection system, Proceedings of IEEE Conference on Cybernetics and Intelligent Systems, Singapore, pp. 872-877, (2004)
[22]  
Xiang C., Yong P.C., Meng L.S., Design of multiplelevel hybrid classifier for intrusion de tection system using Bayesian clustering and decision trees, Pattern Recognition Letters, 29, 7, pp. 918-924, (2008)
[23]  
Xiaonan W.S., Banzhaf W., The use of computational intelligence in intrusion d etection systems: A review, Applied Soft Computing, 10, 1, pp. 1-35, (2010)
[24]  
Yuhong Y., Hsu S.D., Rajput S., Wu B., Experimental analysis of application-level intrusion detection algorithms, Int J. of Security and Networks, 5, 2-3, pp. 198-205, (2010)
[25]  
Zhang C., Jiang J., Kamel M., Intrusion de tection using hierarchical neural networks, Pattern Recognition Letters, 26, 6, pp. 779-791, (2005)
[26]  
Zhang Z., Shen H., Application of online-training SVMs for real-time intrusion detection wi th different considerations, Computer Communications, 28, 12, pp. 1428-1442, (2005)