An Integrated Decision System for Intrusion Detection

被引:0
|
作者
Wang Ling [1 ]
Xiao Haijun [2 ]
机构
[1] Wuhan Inst Technol, Dept Business, Wuhan 430074, Hubei, Peoples R China
[2] China Univ Geosci, Dept Math & Phys, Wuhan 430074, Hubei, Peoples R China
基金
中国国家自然科学基金;
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
As the rapid growth of network attacking tools, Patterns of network intrusion events change gradually. Although many researches have been proposed to analyze attackers' behaviors to improve the detection rate, they still suffer in high false rate in intrusion detection. Therefore, an effective intrusion detection system (IDS) deployment requires carefully planning, preparation, prototyping, testing, and specialized training. So an integrated decision system that consists of three phases was proposed in this paper: Data Preprocessing Phase, Fusion Decision Phase and Data Callback Phase. In Data Preprocessing Phase, two data reduction strategies for IDS are performed efficiently. In Fusion Decision Phase, a dynamic decision and an ensemble technology is designed and performed. In Data Callback Phase, the testing data updated through adding the undetermined data. Our experiment demonstrates that, although the false rate of integrated decision system is not the best of the four approaches discussed, the false rate is so low, its positive rate is the best one of these four, and its training time and decision time is so short that our approach is feasible for online.
引用
收藏
页码:417 / +
页数:2
相关论文
共 50 条
  • [41] Automatic backdoor analysis with a network intrusion detection system and an integrated service checker
    Juslin, J
    Virtanen, T
    IEEE SYSTEMS, MAN AND CYBERNETICS SOCIETY INFORMATION ASSURANCE WORKSHOP, 2003, : 122 - 126
  • [42] A Survey on Intrusion Detection System (IDS) and Internal Intrusion Detection and Protection System (IIDPS)
    Borkar, Amol
    Donode, Akshay
    Kumari, Anjali
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INVENTIVE COMPUTING AND INFORMATICS (ICICI 2017), 2017, : 949 - 953
  • [43] General Study of Intrusion Detection System and Survey of Agent Based Intrusion Detection System
    Saxena, Aumreesh Ku.
    Sinha, Sitesh
    Shukla, Piyush
    2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND AUTOMATION (ICCCA), 2017, : 417 - 421
  • [44] Decision trees approach for anomaly intrusion detection
    Nagata, Tomokazu
    Lee, Jaeho
    Su, Wenhung
    Kinjo, Atsushi
    Shiroma, Tadashi
    Taniguchi, Yuji
    Tamaki, Shiro
    INFORMATION-AN INTERNATIONAL INTERDISCIPLINARY JOURNAL, 2007, 10 (05): : 619 - 630
  • [45] Statistical Decision Making for Authentication and Intrusion Detection
    Dimitrakakis, Christos
    Mitrokotsa, Aikaterini
    EIGHTH INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND APPLICATIONS, PROCEEDINGS, 2009, : 409 - +
  • [46] An Integrated Approach to Network Intrusion Detection and Prevention
    Prakash, B. Bhanu
    Yeswanth, Kaki
    Srinivas, M. Sai
    Balaji, S.
    Sekhar, Y. Chandra
    Nair, Aswathy K.
    INVENTIVE COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES, ICICCT 2019, 2020, 89 : 43 - 51
  • [47] Intrusion detection system using memtic algorithm supporting with genetic and decision tree algorithms
    Dept of IT, Bharath University, Chennai, Tamil Nadu-600073, India
    不详
    不详
    Int. J. Comput. Sci. Issues, 2 2-3 (508-514):
  • [48] Intrusion Detection System using Modified C-Fuzzy Decision Tree Classifier
    Makkithaya, Krishnamoorthi
    Reddy, N. V. Subba
    Acharya, U. Dinesh
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2008, 8 (11): : 29 - 35
  • [49] An Anomaly Intrusion Detection System Using C5 Decision Tree Classifier
    Khraisat, Ansam
    Gondal, Iqbal
    Vamplew, Peter
    TRENDS AND APPLICATIONS IN KNOWLEDGE DISCOVERY AND DATA MINING: PAKDD 2018 WORKSHOPS, 2018, 11154 : 149 - 155
  • [50] APPLICATION OF BPNN IN CLASSIFICATION OF TIME INTERVALS FOR INTELLIGENT INTRUSION DETECTION DECISION RESPONSE SYSTEM
    Zhu, Hongbing
    Kai, Hongmei
    Eguchi, Kei
    Guo, Zhanyong
    Wang, Jun
    INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2008, 4 (10): : 2483 - 2491