A Two-tier Network based Intrusion Detection System Architecture using Machine Learning Approach

被引:0
作者
Divyatmika [1 ]
Sreekesh, Manasa [1 ]
机构
[1] Natl Inst Technol, Dept Comp Sci & Engn, Mangalore, Karnataka, India
来源
2016 INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONICS, AND OPTIMIZATION TECHNIQUES (ICEEOT) | 2016年
关键词
Misuse detection; Anomaly detection; KNN Classification; MLP; Reinforcement Learning; Hierarchical clustering;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Intrusion detection systems are systems that can detect any kind of malicious attacks, corrupted data or any kind of intrusion that can pose threat to our systems. In our paper, we would like to present a novel approach to build a network based intrusion detection system using machine learning approach. We have proposed a two-tier architecture to detect intrusions on network level. Network behaviour can be classified as misuse detection and anomaly detection. As our analysis depends on the network behaviour, we have considered data packets of TCP/IP as our input data. After, pre-processing the data by parameter filtering, we build a autonomous model on training set using hierarchical agglomerative clustering. Further, data gets classified as regular traffic pattern or intrusions using KNN classification. This reduces cost-overheads. Misuse detection is conducted using MLP algorithm. Anomaly detection is conducted using Reinforcement algorithm where network agents learn from the environment and take decisions accordingly. The TP rate of our architecture is 0.99 and false positive rate is 0.01. Thus, our architecture provides a high level of security by providing high TP and low false positive rate. And, it also analyzes the usual network patterns and learns incrementally (to build autonomous system) to separate normal data and threats.
引用
收藏
页码:42 / 47
页数:6
相关论文
共 11 条
[1]  
[Anonymous], P IEEE S SEC PRIV
[2]  
Laskov P, 2005, LECT NOTES COMPUT SC, V3617, P50, DOI 10.1007/11553595_6
[3]  
Lee W, 1998, PROCEEDINGS OF THE SEVENTH USENIX SECURITY SYMPOSIUM, P79
[4]  
Li Wei, 2004, P US DOE CYB C KAN C
[5]   Genetic algorithms with dynamic niche sharing for multimodal function optimization [J].
Miller, BL ;
Shaw, MJ .
1996 IEEE INTERNATIONAL CONFERENCE ON EVOLUTIONARY COMPUTATION (ICEC '96), PROCEEDINGS OF, 1996, :786-791
[6]   Intrusion detection using neural networks and support vector machines [J].
Mukkamala, S ;
Janoski, G ;
Sung, A .
PROCEEDING OF THE 2002 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS, VOLS 1-3, 2002, :1702-1707
[7]  
Rogova Galina L, REINFORCEMENT LEARNI
[8]  
Sinclair C., 1999, P 15 ANN COMP SEC AP
[9]   Intrusion detection by machine learning: A review [J].
Tsai, Chih-Fong ;
Hsu, Yu-Feng ;
Lin, Chia-Ying ;
Lin, Wei-Yang .
EXPERT SYSTEMS WITH APPLICATIONS, 2009, 36 (10) :11994-12000
[10]  
WEKA, 2008, DAT MIN MACH LEARN S