Multiple Learning based Classifiers using Layered Approach and Feature Selection for Attack Detection

被引:0
作者
Subbulakshmi, T. [1 ]
Afroze, A. Farah [2 ]
机构
[1] Sethu Inst Technol, Virudunagar, India
[2] Thiagarajar Coll Engn, Madurai, Tamil Nadu, India
来源
2013 IEEE INTERNATIONAL CONFERENCE ON EMERGING TRENDS IN COMPUTING, COMMUNICATION AND NANOTECHNOLOGY (ICE-CCN'13) | 2013年
关键词
Layered Approach; Intrusion Detection; Attack Detection; Classification; Cost-Benefit Analysis and ROC Curve;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
One of the major shares of the current security infrastructure is formed by the Intrusion Detection Systems (IDS). The attack launched towards the security systems are increasing in a rapid way. The sophistication of attack methods with more automated tools enables the attackers to gain control over the systems and produce threats to the information assets. The normal way of detecting the attacks is by using tools that produce alerts to the system administrators. But most of the attacks would normally escape from these tools since they are mostly rule-based. So the need for enhanced attack detection methods becomes vital for the security infrastructure. The attack detection methods are normally statistical based or probabilistic based. This paper focuses on attack detection using multiple learning based classifiers such as J48, Naive Bayes, Random Forest, Random Tree, KStar, RotationForest, RandomSubspace, Ordinal Class Classifier, Data Near BalancedND and Multiclass classifier. Correlation Based Feature Selection (CFS) is also used to select the best features of the kddcup 99 dataset for the attack classes such as DoS, Probe, U2R and R2L. The feature selection enables the classifiers to improve the accuracy of classification. The multiple classifiers are used in four layers for detecting the four types of attack classes. The classification rate of above 99% is obtained. Cost-Benefit analysis is done for the various attack detection methods and the ROC curves are also plotted.
引用
收藏
页码:308 / 314
页数:7
相关论文
共 7 条
[1]  
[Anonymous], LECT NOTES COMPUTER
[2]  
Gupta Kapil Kumar, 2010, LAYERED APPROACH USI, V7
[3]  
Lappas T, DATA MINING TECHNIQU
[4]   A data mining framework for building intrusion detection models [J].
Lee, W ;
Stolfo, SJ ;
Mok, KW .
PROCEEDINGS OF THE 1999 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, 1999, :120-132
[5]  
Lee W., MINING DATA FLOW ENV
[6]  
Tavallaee M., 2009, DETAILED ANAL KDD CU
[7]  
VedaKReSIT Anshu, INTRUSION DETECTION