Towards a Scalable and Adaptive Learning Approach for Network Intrusion Detection

被引:10
作者
Chiche, Alebachew [1 ,2 ]
Meshesha, Million [1 ,2 ]
机构
[1] Debre Berhan Univ, Coll Comp, Dept Informat Syst, Debre Birhan, Ethiopia
[2] Addis Ababa Univ, Sch Informat Sci, Addis Ababa, Ethiopia
关键词
Compendex;
D O I
10.1155/2021/8845540
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
This paper introduces a new integrated learning approach towards developing a new network intrusion detection model that is scalable and adaptive nature of learning. The approach can improve the existing trends and difficulties in intrusion detection. An integrated approach of machine learning with knowledge-based system is proposed for intrusion detection. While machine learning algorithm is used to construct a classifier model, knowledge-based system makes the model scalable and adaptive. It is empirically tested with NSL-KDD dataset of 40,558 total instances, by using ten-fold cross validation. Experimental result shows that 99.91% performance is registered after connection. Interestingly, significant knowledge rich learning for intrusion detection differs as a fundamental feature of intrusion detection and prevention techniques. Therefore, security experts are recommended to integrate intrusion detection in their network and computer systems, not only for well-being of their computer systems but also for the sake of improving their working process.
引用
收藏
页数:9
相关论文
共 35 条
[1]   Analysis of KDD Dataset Attributes - Class wise For Intrusion Detection [J].
Aggarwal, Preeti ;
Sharma, Sudhir Kumar .
3RD INTERNATIONAL CONFERENCE ON RECENT TRENDS IN COMPUTING 2015 (ICRTC-2015), 2015, 57 :842-851
[2]  
[Anonymous], 1984, CLASSICATION REGRESS
[3]  
[Anonymous], 1996, Neuro-Fuzzy and Soft Computing
[4]  
[Anonymous], KDD CUP
[5]  
Chalak A, 2011, INT J COMPUT SCI NET, V11, P200
[6]  
Christyawan TY., 2019, INDONESIAN J ELECT E, V13, P919, DOI DOI 10.11591/IJEECS.V13.I3.PP919-926
[7]  
Dagne T., 2012, THESIS ETHIOPIA ADDI
[8]   AN INTRUSION-DETECTION MODEL [J].
DENNING, DE .
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 1987, 13 (02) :222-232
[9]  
Farid D.M., 2009, INT J COMPUTER INFOR, V3, P2762
[10]   Random Forest Modeling for Network Intrusion Detection System [J].
Farnaaz, Nabila ;
Jabbar, M. A. .
TWELFTH INTERNATIONAL CONFERENCE ON COMMUNICATION NETWORKS, ICCN 2016 / TWELFTH INTERNATIONAL CONFERENCE ON DATA MINING AND WAREHOUSING, ICDMW 2016 / TWELFTH INTERNATIONAL CONFERENCE ON IMAGE AND SIGNAL PROCESSING, ICISP 2016, 2016, 89 :213-217