Detection of data integrity attacks by constructing an effective intrusion detection system

被引:0
作者
R. B. Benisha
S. Raja Ratna
机构
[1] V V College of Engineering,Department of Computer Science and Engineering
来源
Journal of Ambient Intelligence and Humanized Computing | 2020年 / 11卷
关键词
Integrity; Intrusion detection; Network security; Sampling; Optimization;
D O I
暂无
中图分类号
学科分类号
摘要
Network users are heavily targeted by data integrity attacks that affect the development of new security techniques. The main challenge in network security is to identify this kind of attack for the improvement of growing mechanisms. In this paper, a data integrity based effective intrusion detection system (DI-EIDS) is constructed to prevent the network with a high detection rate and low false alarm rates. It is classified into two phases; data sampling and selection of features. In the data sampling process, attacks are detected and inference based on the sample signatures. In this process, the Deviation forest (d-forest) is used to remove barriers; Grey Wolf Optimization (GWO) is used for sampling ratio optimization and Black forest (BF) classifier to obtain the best training data. To select the best features, GWO and BF are repeatedly used. Finally, DI-EIDS based on the black forest is constructed using the best training data set obtained by data sampling and feature selection. Rare Integrity attacks are detected in this technique when compared with other algorithms. Experimental results are analyzed using different datasets with a 22% sampling rate. The performance results show a higher rate of detection with low false-positive rates.
引用
收藏
页码:5233 / 5244
页数:11
相关论文
共 55 条
[1]  
Al-Yaseen WL(2015)Hybrid modified k-means with c4.5 for intrusion detection systems in multiagent systems Sci World J 2015 14-303
[2]  
Othman ZA(2017)Multi-level hybrid support vector machine and extreme learning machine based on modified K-means for intrusion detection system Expert Syst Appl 67 296-210
[3]  
Nazri MZA(2014)Identity-based chameleon hashing and signatures without key exposure Inf Sci 265 198-83
[4]  
Al-Yaseen WL(2018)An intelligent system for spam detection and identification of the most relevant features based on evolutionary Random Weight Networks Inf Fus 48 67-8
[5]  
Ali Othman Z(2019)An efficient intrusion detection technique based on support vector machine and improved binary gravitational search algorithm Artif Intell Rev 47 5-50
[6]  
Ahmad Nazri MZ(2012)Anomaly detection based on machine learning dimensionality reduction using PCA and classification using SVM Int J Comput Appl 136 37-402
[7]  
Chen X(2018)A hybrid intrusion detection system based on ABC-AFS algorithm for misuse and anomaly detection Comput Netw 67 390-277
[8]  
Zhang F(2017)Network anomaly detection system using genetic algorithm and fuzzy logic Expert Syst Appl 70 255-13500
[9]  
Susilo W(2017)A GA-LR wrapper approach for feature selection in network intrusion detection Comput Secur 18 13492-25
[10]  
Tian H(2012)A network intrusion detection system based on a Hidden Naive Bayes multiclass classifier Expert Syst Appl 16 20-314