Learning Intrusion Detection Based on Adaptive Bayesian Algorithm

被引:0
作者
Farid, Dewan Md. [1 ]
Rahman, Mohammad Zahidur [1 ]
机构
[1] Jahangirnagar Univ, Dept Comp Sci & Engn, Dhaka 1342, Bangladesh
来源
2008 11TH INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY: ICCIT 2008, VOLS 1 AND 2 | 2008年
关键词
Intrusion detection; Bayesian algorithm; classification; detection rate; false positive rate;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recent intrusion detection have emerged an important technique for information security systems. It's very important that the security mechanisms for an information system should be designed to prevent unauthorized access of system resources and data. Last few years, many intelligent learning techniques of machine learning applied to the large volumes of complex and dynamic audit data for the construction of efficient intrusion detection systems (IDS). This paper presents, theoretical overview of intrusion detection and a new approach for intrusion detection based on adaptive Bayesian algorithm. This algorithm correctly classify different types of attack of KDD99 benchmark intrusion detection dataset with high detection accuracy in short response time. The experimental result also shows that, this algorithm maximize the detection rate (DR) and minimized the false positive rate (FPR) for intrusion detection.
引用
收藏
页码:628 / 632
页数:5
相关论文
共 15 条
[1]  
Anderson J.P., 1980, Computer security threat monitoring and surveillance
[2]  
[Anonymous], 1996, P 2 INT C KNOWLEDGE
[3]  
Cannady J., 1998, P 1998 NAT INF SYST, P443
[4]  
Cestnik B., 1990, P EUR C ART INT, P147
[5]  
Fisher D. H., 1987, Machine Learning, V2, P139, DOI 10.1007/BF00114265
[6]  
Kononenko I, 1990, CURRENT TREND KNOWLE
[7]  
LANGLEY P, 1992, AAAI-92 PROCEEDINGS : TENTH NATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE, P223
[8]  
LASKOV P, 2006, LEARNING INTRUSION D
[9]   A data mining framework for building intrusion detection models [J].
Lee, W ;
Stolfo, SJ ;
Mok, KW .
PROCEEDINGS OF THE 1999 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, 1999, :120-132
[10]  
MUKHERJEE B, 1994, NETWORK INTRUSION DE, P26