ENSEMBLE TECHNIQUE FOR INTRUDER DETECTION IN NETWORK TRAFFIC

被引:1
作者
Agrawal, Amar [1 ]
Mohammed, Sabah [1 ]
Fiaidhi, Jinan [1 ]
机构
[1] Lakehead Univ, Dept Comp Sci, Thunder Bay, ON, Canada
来源
INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS | 2019年 / 13卷 / 03期
关键词
Intrusion Detection System (IDS); Data Mining; Ensemble Techniques; INTRUSION DETECTION;
D O I
10.33832/ijsia.2019.13.3.01
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Due to increasing incidents of cyber-attacks, building effective intrusion detection systems are essential for protecting information systems security, and yet it remains an elusive goal and a great challenge. However, most of the conducted studies rely on static and one-time dataset where all the changes monitored are based on the dataset used. As network behaviors and patterns change and intrusions evolve, thus it has very much become necessary to move away from static and one-time dataset toward more dynamically configurable classifiers. The Current researches show that different classifiers provide different results about the patterns to be classified. These different results combined together (aka ensemble) yields better performance than individual classifiers. In this paper we have used a hybrid ensemble intrusion detection system consisting of a Misuse Binary Tree of Classifiers as the first stage and an anomaly detection model based upon SVM Classifier as the second stage. The Binary Tree consists of several best known classifiers specialized in detecting specific attacks at a high level of accuracy. Combination of a Binary Tree and specialized classifiers will increase accuracy of the misuse detection model. The misuse detection model will detect only known attacks. In-order to detect unknown attacks, we have an anomaly detection model as the second stage. SVM has been used, since it's the best known classifier for anomaly detection which will detect patterns that deviate from normal behavior. The proposed hybrid intrusion detection has been tested and evaluated using KDD Cup '99, NSL-KDD and UNSW-NB15 datasets.
引用
收藏
页码:1 / 8
页数:8
相关论文
共 6 条
[1]  
Ahmim A., 2015, NEW HIERARCHICAL INT
[2]   Mining network data for intrusion detection through combining SVMs with ant colony networks [J].
Feng, Wenying ;
Zhang, Qinglei ;
Hu, Gongzhu ;
Huang, Jimmy Xiangji .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2014, 37 :127-140
[3]   A novel hybrid intrusion detection method integrating anomaly detection with misuse detection [J].
Kim, Gisung ;
Lee, Seungmin ;
Kim, Sehun .
EXPERT SYSTEMS WITH APPLICATIONS, 2014, 41 (04) :1690-1700
[4]  
Kumar M., 2014, INT C CONV TECHN 201, P1, DOI DOI 10.1109/I2CT.2014.7092027
[5]   A Design and Implementation of Intrusion Detection System by using Data Mining [J].
Sharma, Brijesh ;
Gupta, Huma .
2014 FOURTH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORK TECHNOLOGIES (CSNT), 2014, :700-704
[6]   Top 10 algorithms in data mining [J].
Wu, Xindong ;
Kumar, Vipin ;
Quinlan, J. Ross ;
Ghosh, Joydeep ;
Yang, Qiang ;
Motoda, Hiroshi ;
McLachlan, Geoffrey J. ;
Ng, Angus ;
Liu, Bing ;
Yu, Philip S. ;
Zhou, Zhi-Hua ;
Steinbach, Michael ;
Hand, David J. ;
Steinberg, Dan .
KNOWLEDGE AND INFORMATION SYSTEMS, 2008, 14 (01) :1-37