Intrusion Detection System using Bayesian Network and Feature Subset Selection

被引:0
作者
Jabbar, M. A. [1 ]
Aluvalu, Rajanikanth [1 ]
Reddy, S. Sai Satyanarayana [2 ]
机构
[1] Vardhaman Coll Engn, Dept CSE, Hyderabad, Telangana, India
[2] Vardhaman Coll Engn, Hyderabad, Telangana, India
来源
2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMPUTING RESEARCH (ICCIC) | 2017年
关键词
Intrusion detection system; Bayesian network; Kyoto data set; Feature selection;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Attack detection is a challenging area of research in the field of information security. Intruders use various techniques to gain the unauthorized access to computer network. Intrusion detection is a mechanism for detecting and preventing various attacks. Recently Intrusion Detection System (IDS) along with antivirus software plays a vital role in information security architecture of many organizations. Many machine learning approaches have been used to increase the efficiency and detection rate of intrusion detection system. Irrelevant and redundant features in data will cause a problem in network traffic classification. These irrelevant and redundant features will slow down the process of classification and also prevent a classifier from making accurate and efficient decisions when handling with big data. In this paper, we propose intrusion detection system using Bayesian network and feature selection. The performance is evaluated using Kyoto data set. The Experimental results show that our proposed approach achieves with a detection rate of 99.9% and efficiency in detecting network traffic attack.
引用
收藏
页码:640 / 644
页数:5
相关论文
共 15 条
[1]  
Abhaya, 2014, DATA MINING TECHNIQU, V3, P6938
[2]  
Akshaya P., 2016, IJECS, V05
[3]  
Ayman, 2014, IJETT, V9, P501
[4]  
Ben-Gal I., 2007, ENCY STAT QUALITY RE, P1, DOI [10.1002/9780470061572.eqr089, DOI 10.1002/9780470061572.EQR089]
[5]  
cemeric Alma, 2008, PROD SEKE2008, P1
[6]  
Deepika, 2012, IJESIT, V1, P54
[7]   Random Forest Modeling for Network Intrusion Detection System [J].
Farnaaz, Nabila ;
Jabbar, M. A. .
TWELFTH INTERNATIONAL CONFERENCE ON COMMUNICATION NETWORKS, ICCN 2016 / TWELFTH INTERNATIONAL CONFERENCE ON DATA MINING AND WAREHOUSING, ICDMW 2016 / TWELFTH INTERNATIONAL CONFERENCE ON IMAGE AND SIGNAL PROCESSING, ICISP 2016, 2016, 89 :213-217
[8]  
Jabbar M. A., 2016, SOCPAR2016, P490
[9]  
Jabbar M. A., 2016, IEEE I4C2016
[10]  
Jabbar M.A., 2017, Proceedings of the 9th International Conference on Machine Learning and Computing, P253