An Effective Approach for Improving Anomaly Intrusion Detection
Keywords:
Intrusion Detection System, Layered approach, Clustering, FAMAbstract
Intrusion Detection Systems (IDS) is a key part of system defense, where it identifies abnormal activities happening in a computer system. In general, the traditional intrusion detection relies on the extensive knowledge of security experts, in particular, on their familiarity with the computer system to be protected. To reduce this dependence, various data-mining, soft-computing and machine learning techniques have been proposed in recent years for the development of better intrusion detection systems. Many researchers used Conditional Random Fields and Layered Approach for purpose of intrusion detection. They also demonstrated that high attack detection accuracy can be achieved by using Conditional Random Fields and high efficiency by implementing the Layered approach. In the paper we explained a new method called fuzzy ARTMAP classifier (FAM) and clustering technique for effectively identifying the intrusion activities within a network. Processing huge data would make the system error prone, hence clustering the data into groups and then processing will result in having a better system. From each of the cluster, representative data is selected in the selective process for further processing. For classification process, layered fuzzy ARTMAP will have the better results when compared to other normal classifier algorithms. Finally the experiments and evaluations of the proposed intrusion detection system is using the KDD Cup 99 intrusion detection data set.
References
Yao, J. T., S.L. Zhao, and L.V. Saxton, “A Study On Fuzzy Intrusion Detection”, In Proceedings of the Data Mining, Intrusion Detection, Information Assurance, And Data Networks Security, SPIE, Vol. 5812, pp. 23-30 ,28 March - 1 April, Orlando, Florida, USA, 2005.
Nivedita Naidu and Dr.R.V.Dharaskar, “An Effective Approach to Network Intrusion Detection System using Genetic Algorithm”, International Journal of Computer Applications, Vol.1, No.3, pp.26–32, February 2010.
Peyman Kabiri and Ali A. Ghorbani. Research on Intrusion Detection and Response: A Survey. International Journal of Network Security, 1(2):84–102, 2005
B Mukherjee, L Todd Heberlein, K N Levitt, 1994. “Network intrusion detection. IEEE Network, Vol. 8, No. 3, pp.26–41,1994.
J. Allen, A. Christie, and W. Fithen, “State Of the Practice of Intrusion Detection Technologies”, Technical Report, CMU/SEI-99-TR-028, 2000.
Kapil Kumar Gupta, Baikunth Nath and Ramamohanarao Kotagiri, “Layered Approach Using Conditional Random Fields for Intrusion Detection”, IEEE Transactions on Dependable and Secure Computing, Vol. 7, No. 1, 2010.
G. Gowrisona, K. Ramarb, K. Muneeswaranc, T. Revathic, " Minimal complexity attack classification intrusion detection system", Applied Soft Computing, vol 13, pp: 921–927, 2013.
Shingo Mabu, Nannan Lu, Kaoru Shimada,KotaroHirasawa, " An Intrusion-Detection Model Based on Fuzzy Class-Association-Rule Mining Using Genetic Network Programming", IEEE Transactions On Systems, Man, And Cybernetics—Part C: Applications And Reviews, VOL. 41, NO. 1, PP: 130-139 , 2011
Latifur Khan, MamounAwad, BhavaniThuraisingham, “A new intrusion detection system using support vector machines and hierarchical clustering”, The International Journal on Very Large Data Bases, Vol. 16, no. 4, October 2007.
M. Bahrololum, E. Salahi and M. Khaleghi “Anomaly intrusion detection design using hybrid of unsupervised and supervised neural networks”, International Journal of Computer Networks & Communications, Vol.1, No.2, 2009.
K.S. Anil Kumar and Dr. V. NandaMohan, " Novel Anomaly Intrusion Detection Using Neuro-Fuzzy Inference System ", IJCSNS International Journal 6 of Computer Science and Network Security, vol.8, no.8, pp.6-11 , August 2008.
Shekhar R. Gaddam, Vir V. Phoha, Kiran S. Balagani, “K-Means+ID3: A Novel Method for Supervised Anomaly Detection by Cascading K-Means Clustering and ID3 Decision Tree Learning Methods”, IEEE Transactions on Knowledge and Data Engineering, Vol. 19, No. 3, pp. 345-354, 2007.
Vipin Kumar, Himadri Chauhan and Dheeraj Panwar, “K-Means Clustering Approach to Analyze NSL-KDD Intrusion Detection Dataset” International Journal of Soft Computing and Engineering (IJSCE), pp. 2231-2307, Volume-3, Issue-4, September 2013
Rachnakulhare and Divakar Singh, “Intrusion Detection System based on Fuzzy C Means Clustering and Probabilistic Neural Network”, International Journal of Computer Applications, Vol. 74, No.2, 2013.
KDD Cup 1999. Available on: http://kdd.ics.uci.edu/databases/kddcup 99/kddcup99.html, Ocotber 2007.
Jaskaranjit Kaur and Gurpreet Kaur, “Clustering Algorithms in Data Mining: A Comprehensive Study”, International Journal of Computer Science and Engineering , vol. 3 Issue.7, pp 57-61, July 2015.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
