CFP last date
20 May 2024
Reseach Article

Fast Hierarchical Relevance Vector Machine towards Network Intrusion Detection System

by V. Jaiganesh
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 127 - Number 1
Year of Publication: 2015
Authors: V. Jaiganesh
10.5120/ijca2015906312

V. Jaiganesh . Fast Hierarchical Relevance Vector Machine towards Network Intrusion Detection System. International Journal of Computer Applications. 127, 1 ( October 2015), 27-31. DOI=10.5120/ijca2015906312

@article{ 10.5120/ijca2015906312,
author = { V. Jaiganesh },
title = { Fast Hierarchical Relevance Vector Machine towards Network Intrusion Detection System },
journal = { International Journal of Computer Applications },
issue_date = { October 2015 },
volume = { 127 },
number = { 1 },
month = { October },
year = { 2015 },
issn = { 0975-8887 },
pages = { 27-31 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume127/number1/22695-2015906312/ },
doi = { 10.5120/ijca2015906312 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:18:45.482439+05:30
%A V. Jaiganesh
%T Fast Hierarchical Relevance Vector Machine towards Network Intrusion Detection System
%J International Journal of Computer Applications
%@ 0975-8887
%V 127
%N 1
%P 27-31
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Internet becomes very essential needs in today’s life because internet has become a public network world wide. The art of detecting inappropriate, incorrect, or anomalous activity is Intrusion Detection (ID). It is a security service which monitors and analyzes system events for finding, and creating a real-time or near real-time scenario, trials to access system resources in an unauthorized manner. In the proposed Fast Hierarchical Relevance Vector Machine (FHRVM), Analytical Hierarchy Process Method (AHP) is used to select the input weights and hidden biases. The algorithm is used to analytically determine the output weights and the Iterative Learning Mechanism (ILM) algorithm is employed in order to learn the network through Relevance Vector Machine (RVM). It is established by developing a probabilistic Bayesian learning structure which is capable enough to derive accurate prediction models. Such prediction models will exploit considerably fewer basis functions. These incorporate the benefits of valid predictions; elimination of non-impact attributes along with it will facilitate usage of arbitrary functions. Simulation has been carried out using Math works MATLAB R2012a. KDD Cup 1999 dataset is taken for testing the performance of the proposed work and the results indicate that FHRVM has achieved higher detection rate and low false alarm rate than that of existing RVM algorithm.

References
  1. K.Vivek . Kshirsagar, M.Sonali . Tidke & Swati Vishnu, “Intrusion Detection System using Genetic Algorithm and Data Mining: An Overview”, International Journal of Computer Science and Informatics ISSN (PRINT): 2231 –5292, Vol-1, Iss-4, 2012
  2. D. Anderson, T. Frivold and A. Valdes, “Next-generation intrusion detection expert system (NIDES): a summary”, Technical Report SRI-CSL-95-07. Computer Science Laboratory, SRI International, Menlo Park, CA, 1995.
  3. S. Axelsson, “Research in intrusion detection systems: a survey”, Technical Report TR 98-17 (revised in 1999). Chalmers University of Technology, Goteborg, Sweden, 1999.
  4. S. Freeman, A. Bivens, J. Branch and B. Szymanski, “Host-based intrusion detection using user signatures”, Proceedings of the Research Conference. RPI, Troy, NY, 2002.
  5. D. Marchette, “A statistical method for profiling network traffic”, Proceedings of the First USENIX Workshop on Intrusion Detection and Network Monitoring, Santa Clara, CA, Pp. 119–128, 1999.
  6. R.G. Bace, “Intrusion Detection”, Macmillan Technical Publishing, 2000.
  7. F. Chuan, P. Jianfeng, Q. Haiyan, and W. R. Jerzy, “Alert fusion for a computer host based intrusion detection system,” in Proceedings of the 14th Annual IEEE International Conference and Workshops on the Engineering of Computer-Based Systems, 2007, pp. 433-440.
  8. W. Rensheng and V. N. Jeffrey, “Search strategy optimization for intruder detection,” IEEE Sensors Journal, Vol. 7, 2007, pp. 315-316.
  9. J. G. Tront and R. C. Marchany, “Internet security: Intrusion detection and prevention in mobile systems,” in Proceedings of the 40th Annual Hawaii International Conference on System Sciences, 2007, pp. 162-162.
  10. Mohammadreza Ektefa, Sara Memar, Fatimah Sidi and Lilly Suriani Affendey, “Intrusion Detection Using Data Mining Techniques”, IEEE, 2010. ISBN: 978-1-4244-5651-2/10
  11. Avolio, M.Frederick. “A multidimensional approach to internet security.” netWorkervol. 2.2, April 1998, pp. 15-22.N.S.Chandolikar1 & V.D.Nandavadekar2, “Comparative Analysis Of Two Algorithms For Intrusion Attack Classification Using Kdd Cup Dataset”, International Journal of Computer Science and Engineering (IJCSE) Vol.1, Issue 1 Aug 2012 81-88 © IASE.
  12. R.J. Kuo, S.C. Chi, S.S. Kao, "A decision support system for selecting convenience store location through integration of fuzzy AHP and artificial neural network," Computers in Industry, vol. 47, pp 199-214, 2002.
  13. T.L. Saaty, "Fundamentals of Decision Making and Priority Theory with the Analytic Hierarchy Process," vol. VI, RWS Publication, Pittsburgh, 1994.
  14. Y.-C. Hu, J.-F. Tsai, "Backpropagation multilayer perception for incomplete pair wise comparison matrices in analytic hierarchy process," Applied Mathematics and Computation, vol. 180, pp 53–62, 2006.
  15. B.G. Kermani, S.S. Schiffman, H.T. Nagle, "Performance of the Levenberg–Marquardt neural network training method in electronic nose applications," Sensors and Actuators B, vol. 110, pp 13-22, 2005.
  16. M. Hgan, H. Demuth, and M. Beale, "Neural Network Design," Boston: PWS, 1996.
  17. V.Jaiganesh , Dr.P.Sumathi “An Efficient Intrusion Detection using Fast Hierarchical Relevance Vector Machine",JATIT, ISSN: 1992 - 8645, E- ISSN: 1817- 3195,, Volume No: 62, Issue No: 1, April 2014
Index Terms

Computer Science
Information Sciences

Keywords

Intrusion Detection System (IDS) Relevance Vector Machine (RVM) Levenberg Marquardt and Analytical Hierarchical Process.