Perfection of Intrusion Detection Using Correlation, Genetic Algorithm, Radial Basis Function

S Selvakani, R.S Rajesh

Abstract


The tech-savvy generation of today uses network, which has become embedded in everyone’s routine and is inseparable from our life. Hence securing your network from various network attacks becomes paramount for us to keep our sensitive data online safe. One of the most noticeable threats to the security of networks is intruder. Due to the number of challenges faced by the Intrusion Detection System, it is a priority to detect malicious activities in a network and have an enhanced performance to cope with the increasing network traffic. The results of our experiment throw a light of our IDS ability to improve the attack detection rate and decreasing the FAR. This Intrusion detection system can do with a low FAR and the low FAR important for its functioning. The time required to train to test the model is significantly reduced by feature selection and implementing the layered approach with the help of GA and RBF. We address two concepts in this paper, first deals with features reduction based on correlation and secondly genetic algorithm rules formation with RBF training. The overall accuracy and efficiency of the system is improved by integrating them.

Keywords


Intrusion Detection; Feature Reduction; Ranking Algorithm; Genetic Algorithm; Radial Basis Function

References


AbdRazak S., Furnell S., Clarke N., and Brooke P., “A Two-Tier Intrusion Detection System for Mobile Ad Hoc Networks – A Friend Approach,” in Proceedings of Lecture Notes in Computer Science, Berlin, pp. 590-595 (2006).

Almgren M., Lindqvist U., and Jonsson E. “A Multi-Sensor Model to Improve Automated Attack Detection,” in Proceedings of Lecture Notes in Computer Science , Berlin, pp. 291-310 (2008).

Carver C., Humphries J., and Pooch U., “Adaptation Techniques for Intrusion Detection and Intrusion Response Systems,” in Proceedings of IEEE International Conference on Systems Man and Cybernetics, USA, pp. 2344-2349.(2000).

CHATZIGIANNAKIS, V., ANDROULIDAKIS, G., PELECHRINIS, K., PAPAVASSILIOU, S., MAGLARIS, V. Data fusion algorithms for network anomaly detection: classification and evaluation. Proceedings of the Third International Conference on Networking and Services, 50 – 51 (2007).

CHEN, Q., AICKELIN, U. Dempster-Shafer for Anomaly Detection. In Proceedings of the International Conference on Data Mining (DMIN 2006), Las Vegas, USA, 232-238(2006).

CHOU, T. , Ensemble fuzzy belief intrusion detection design. PhD thesis, Florida international university, Florida, USA, (2007).

HU, W., LI, J., GAO, Q. Intrusion Detection Engine Based on Dempster-Shafer's Theory of Evidence. Communications, Circuits and Systems Proceedings, 2006 International Conference, 3, 1627-1631 (2006).

J. McHugh,Testing intrusion detection systems: a critique of the 1998 and 1999 DARPA intrusion detection, ACM Transactions on Information and System Security (TISSEC) 3 (4) 262–294 (2000).

KATAR, C., Combining multiple techniques for intrusion detection. IJCSNS International Journal of Computer Science and Network Security, 6(2B), 125-129 (2006).

KDD99 archive: The Fifth International Conference on Knowledge Discovery and Data Mining. http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html.

Laleh N. and Azgomi M., “A Taxonomy of Frauds and Fraud Detection Techniques,” in Proceeding of Communications in Computer and Information Science, Berlin, pp. 256-267,(2009).

M. Mahoney, P.K. Chan, An analysis of the 1999 DARPA/Lincoln laboratory evaluation data for network anomaly detection. Recent advances in intrusion detection: 6th international symposium, RAID 220–237, doi:10.1007/b13476 (2003).

Mosqueira-Rey E., Alonso-Betanzos A., Rio B., and Pineiro J., “A Misuse Detection Agent for Intrusion Detection in a Multi-agent Architecture,” in Proceedings of the 1 st KES International Symposium on Agent and Multi-Agent Systems: Technologies and Applications Berlin, pp. 466-475, (2007).

Haviluddin, R. Alfred, J. H. Obit, M. H. A. Hijazi, and A. A. A. Ibrahim, "A Performance Comparison of Statistical and Machine Learning Techniques in Learning Time Series Data," Advanced Science Letters, pp. 3037-3041, 2015.

Rehak M., Pechoucek M., Bartos K., Grill M., Celeda P., and Krmick V., “An Intrusion Detection System for High-Speed Networks,” in Proceedings of National Institute of Informatics, Berlin, pp. 65-74,(2008).

SPSS 11.0 © SPSS] Inc, www.spss.com

WEKA software, Machine Learning, http://www.cs.waikato.ac.nz/ml/weka/, The University of Waikato, Hamilton, New Zealand.

YU, D., FRINCKE, D., Alert confidence fusion in intrusion detection systems with extended Dempster-Shafer theory. ACM-SE 43: Proceedings of the 43rd annual southeast regional conference. 2, 142 – 147, (2005).

Zhang Z. and Shen H, “A Brief Observation-Centric Analysis on Anomaly-Based Intrusion Detection”, in Proceedings of Lecture Notes in Computer Science, Berlin, pp. 178-191.(2005).




DOI: http://dx.doi.org/10.19732/10.19732/vol1122016

Refbacks

  • There are currently no refbacks.


Copyright (c) 2016 International Journal of Computing and Informatics (IJCANDI)

Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.


International Journal of Computing and Informatics (eISSN: 2502-2334)
Organized by Universitas Mulawarman, Universiti Malaysia Sabah, Universitas Muslim Indonesia
Published by Universitas Mulawarman 
W : http://ijcandi.org
E  : ijcandi@unmul.ac.id or haviluddin.ijcandi@gmail.com

Creative Commons License
IJCANDI is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.

View My Stats