Fusion of Misuse Detection with Anomaly Detection Technique for Novel Hybrid Network Intrusion Detection System

被引:4
作者
Hussain, Jamal [1 ]
Lalmuanawma, Samuel [1 ]
机构
[1] Mizoram Univ, Math & Comp Sci Dept, Aizawl 796004, Mizoram, India
来源
RECENT DEVELOPMENTS IN INTELLIGENT COMPUTING, COMMUNICATION AND DEVICES, ICCD 2016 | 2017年 / 555卷
关键词
Hybrid IDS; Feature selection; Naive Bayes classifier; Decision tree; One-class SVM; FEATURE-SELECTION; SUPPORT;
D O I
10.1007/978-981-10-3779-5_10
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Intrusion detection system (IDS) was designed to monitor the abnormal activity occurring in the computer network system. Many researchers concentrate their efforts on designing different techniques to build reliable IDS. However, individual technique such as misuse and anomaly techniques alone failed to provide the best possible detection rate. In this paper, we proposed a new hybrid IDS model with feature selection that integrates misuse detection technique and anomaly detection technique based on a decision rule structure. The key idea was to take the advantage of naive Bayes (NB) feature selection, misuse detection technique based on decision tree (DT), and anomaly detection based on one-class support vector machine (OCSVM). First, misuse detection is built using single DT algorithm where the training data get decomposed into multiple subsets with the help of decision rules. Then, anomaly detection models are created for each decomposed subset based on multiple OCSVM. In the proposed model, NB and DT can find the best-selected features to ameliorate the detection accuracy by obtaining decision rules for known normal and attack anomalies. Then, the OCSVM can detect new attacks that result in an improvement in the detection accuracy of classification. The proposed new hybrid model was evaluated based on the NSL-KDD data sets, which is an upgraded version of KDD99 data set developed by DARPA. Simulation results demonstrate that the proposed hybrid model outperforms conventional models in terms of time complexity and detection rate with the much lower rate of false positives.
引用
收藏
页码:73 / 87
页数:15
相关论文
共 22 条
  • [1] Beauquier J, 2008, INT J COMPUTER SCI, V2, P178
  • [2] LIBSVM: A Library for Support Vector Machines
    Chang, Chih-Chung
    Lin, Chih-Jen
    [J]. ACM TRANSACTIONS ON INTELLIGENT SYSTEMS AND TECHNOLOGY, 2011, 2 (03)
  • [3] Cherkassky V, 1997, IEEE Trans Neural Netw, V8, P1564, DOI 10.1109/TNN.1997.641482
  • [4] An intelligent intrusion detection system (IDS) for anomaly and misuse detection in computer networks
    Depren, O
    Topallar, M
    Anarim, E
    Ciliz, MK
    [J]. EXPERT SYSTEMS WITH APPLICATIONS, 2005, 29 (04) : 713 - 722
  • [5] Hall M., 2009, SIGKDD EXPLORATIONS, V11, P10, DOI [DOI 10.1145/1656274.1656278, 10.1145/1656274.1656278]
  • [6] A novel hybrid intrusion detection method integrating anomaly detection with misuse detection
    Kim, Gisung
    Lee, Seungmin
    Kim, Sehun
    [J]. EXPERT SYSTEMS WITH APPLICATIONS, 2014, 41 (04) : 1690 - 1700
  • [7] LAZAREVIC A, 2003, P 3 SIAM C DAT MIN
  • [8] PKG-VUL Security Vulnerability Evaluation and Patch Framework for Package-Based Systems
    Lee, Jong-Hyouk
    Sohn, Seon-Gyoung
    Chang, Beom-Hwan
    Chung, Tai-Myoung
    [J]. ETRI JOURNAL, 2009, 31 (05) : 554 - 564
  • [9] Parameter determination of support vector machine and feature selection using simulated annealing approach
    Lin, Shih-Wei
    Lee, Zne-Jung
    Chen, Shih-Chieh
    Tseng, Tsung-Yuan
    [J]. APPLIED SOFT COMPUTING, 2008, 8 (04) : 1505 - 1512
  • [10] An intelligent algorithm with feature selection and decision rules applied to anomaly intrusion detection
    Lin, Shih-Wei
    Ying, Kuo-Ching
    Lee, Chou-Yuan
    Lee, Zne-Jung
    [J]. APPLIED SOFT COMPUTING, 2012, 12 (10) : 3285 - 3290