Intrusion-Miner: A Hybrid Classifier for Intrusion Detection using Data Mining

被引:0
作者
Zafar, Samra [1 ]
Kamran, Muhammad [2 ]
Hu, Xiaopeng [1 ]
机构
[1] Dalian Univ Technol, Sch Elect Informat & Elect Engn, Dalian 116024, Peoples R China
[2] Univ Jeddah, Coll Comp Sci & Engn, Jeddah, Saudi Arabia
关键词
Intrusion detection system; principal component analysis; intrusion-minor; fisher discriminant ratio; NETWORK ANOMALY DETECTION; K-MEANS;
D O I
10.14569/ijacsa.2019.0100440
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
With the rapid growth and usage of internet, number of network attacks have increase dramatically within the past few years. The problem facing in nowadays is to observe these attacks efficiently for security concerns because of the value of data. Consequently, it is important to monitor and handle these attacks and intrusion detection system (IDS) has potentially diagnostic ability to handle these attacks to secure the network Numerous intrusion detection approaches are presented but the main hindrance is their performance which can be improved by increasing detection rate as well as decreasing false positive rates. Optimizing the performance of IDS is very serious issue and challenging fact that gets more attention from the research community. In this paper, we proposed a hybrid classification approach 'Intrusion-Miner' with the help of two classifier algorithm for network anomaly detection to get optimum result and make it possible to detect network attacks. Thus, principal component analysis (PCA) and Fisher Discriminant Ratio (FDR) have been implemented for the feature selection and noise removal. This hybrid approach is compared with J48, Bayesnet, JRip, SMO, IBK and evaluate the performance using KDD99 dataset. Experimental result revealed that the precision of the proposed approach is measured as 96.1 % with low false positive and high false negative rate as compare to other state-of-the-art algorithm. The simulation result evaluation shows that perceptible progress and real-time intrusion detection can be attained as we apply the suggested models to identify diverse kinds of network attacks.
引用
收藏
页码:329 / 336
页数:8
相关论文
共 29 条
[1]  
Aljawarneh S., 2001, J COMPUTATIONAL SCI, V25, P152
[2]   Investigations of automatic methods for detecting the polymorphic worms signatures [J].
Aljawarneh, Shadi A. ;
Moftah, Raja A. ;
Maatuk, Abdelsalam M. .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2016, 60 :67-77
[3]  
Anderson D., 1995, Next-generation intrusion detection expert system (NIDES): A summary
[4]  
Bhavsar Y.B, 2013, International Journal of Emerging Technology andAdvanced Engineering, V3, P581
[5]   Network Anomaly Detection: Methods, Systems and Tools [J].
Bhuyan, Monowar H. ;
Bhattacharyya, D. K. ;
Kalita, J. K. .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2014, 16 (01) :303-336
[6]   PCA filtering and probabilistic SOM for network intrusion detection [J].
De la Hoz, Eduardo ;
De La Hoz, Emiro ;
Ortiz, Andres ;
Ortega, Julio ;
Prieto, Beatriz .
NEUROCOMPUTING, 2015, 164 :71-81
[7]   AN INTRUSION-DETECTION MODEL [J].
DENNING, DE .
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 1987, 13 (02) :222-232
[8]  
Dhanabal L, 2015, Int J Adv Res Comput Commun Eng, V4, P446, DOI DOI 10.17148/IJARCCE.2015.4696
[9]  
Ghorbani AA, 2010, ADV INFORM SECUR, V47, P1, DOI 10.1007/978-0-387-88771-5
[10]  
Ghosh A.K., 1998, COMP SEC APPL C 1998