CFP last date
22 April 2024
Reseach Article

Improving Information Integrity using Artificial Bee Colony based Intrusion Detection System

by Qamar Rayees Khan, Mohammad Asger, Muheet Ahmed Butt
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 130 - Number 6
Year of Publication: 2015
Authors: Qamar Rayees Khan, Mohammad Asger, Muheet Ahmed Butt
10.5120/ijca2015906771

Qamar Rayees Khan, Mohammad Asger, Muheet Ahmed Butt . Improving Information Integrity using Artificial Bee Colony based Intrusion Detection System. International Journal of Computer Applications. 130, 6 ( November 2015), 12-23. DOI=10.5120/ijca2015906771

@article{ 10.5120/ijca2015906771,
author = { Qamar Rayees Khan, Mohammad Asger, Muheet Ahmed Butt },
title = { Improving Information Integrity using Artificial Bee Colony based Intrusion Detection System },
journal = { International Journal of Computer Applications },
issue_date = { November 2015 },
volume = { 130 },
number = { 6 },
month = { November },
year = { 2015 },
issn = { 0975-8887 },
pages = { 12-23 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume130/number6/23212-2015906771/ },
doi = { 10.5120/ijca2015906771 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:24:37.753291+05:30
%A Qamar Rayees Khan
%A Mohammad Asger
%A Muheet Ahmed Butt
%T Improving Information Integrity using Artificial Bee Colony based Intrusion Detection System
%J International Journal of Computer Applications
%@ 0975-8887
%V 130
%N 6
%P 12-23
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Nowadays, Information, which is managed by Database Management System, is deemed as an asset for any of the organizations. Malicious attacks over a computer network can decrease security and trust of a system which may lead to various threats, which will be mitigated by introducing Intrusion Detection System. Emerging Intrusion detection systems (IDS) cannot improve the Integrity and in order to offer higher security for the confidential data with information integrity, an Artificial Bee Colony algorithm based Intrusion Detection system (ABC-IDS) is proposed. Clustering, Mining and Classification are the three major phases of this proposed system. The primary step is clustering the given datasets which helps to recover the quality of the datasets by partitioning the quantity in a cluster. Clustering is worked out by the clustering algorithm, Fuzzy C-Means and the second phase Mining is completed on the clustered datasets in order to get mined results by successfully mining the given datasets with the aid of Frequent Item set mining. The generated rules in the mining process get optimized by the usage of Artificial Bee Colony algorithm. After acquiring optimized mined results, the Classification phase is carried out by using Artificial Neural Network classifier, which classifies the input dataset into Intrusion or Non-Intrusion packets. This proposed method is implemented in MATLAB platform over DARPA dataset and then it is analyzed for its accuracy of Intrusion detection rate and Non-Intrusion detection rate, which will also evidently improve the consistency and reliability of the ABC-IDS system. Moreover, comparison of the proposed methodology with the state-of-art works is done to prove the improvement in information integrity in the proposed method. Hence, the optimum Integrity is increased by this research by the increase of its intrinsic attributes of accuracy, consistency and reliability.

References
  1. S.Janakiraman, S.Rajasoundaran and P.Narayanasamy, "The Model - Dynamic and Flexible Intrusion Detection Protocol for High Error Rate Wireless Sensor Networks Based on Data Flow”, In The Proceeding of IEEE 6th International Conference of Mobile Adhoc and Sensor Systems, pp. 313-321, Oct 2009.
  2. Zhou Mingqiang, Huang Hui, Wang Qian, "A Graph-Based Clustering Algorithm for Anomaly Intrusion Detection", In Proceedings of 7th International Conference onComputer Science &Education, pp. 1311-1314, July 2012.
  3. Zhou Mingqiang, Huang Hui, Wang Qian, "A Graph-Based Clustering Algorithm for Anomaly Intrusion Detection", In Proceedings of 7th International Conference onComputer Science &Education, pp. 1311-1314, July 2012
  4. Yongquan Mo,Yizhong Ma And Liang Xu, "Design And Implementation of Intrusion Detection Based on Mobile Agents", In Proceeding of IEEE International Conference of Medical and Education, pp. 278-281, 2008.
  5. Amrita Anand, Brajesh Patel, "An Overview on Intrusion Detection System and Types of Attacks It Can Detect Considering Different Protocols ", Journal of Advanced Research in Computer Science and Software Engineering, Vol. 2, No. 8, pp. 94-98, Aug 2012.
  6. Mostaque Md. Morshedur Hassan, "Current Studies on Intrusion Detection system, Genetic Algorithm and Fuzzy Logic ", International Journal of Distributed and Parallel Systems (IJDPS), Vol.4, No.2, Mar 2013.
  7. Chunfu Jia, Deqiang Chen, "Performance Evaluation of A Collaborative Intrusion Detection System ",In Proceeding of theFifth International Conference on Natural Computation, pp. 409-413, Aug 2009.
  8. Jiong Zhang, Mohammad Zulkernine, and Anwar Haque, "Random-Forests-Based Network Intrusion Detection Systems", In Proceeding of IEEE Transactions on Systems, Man, and Cybernetics—Part C: Applications and Reviews, Vol. 38, No. 5, pp. 649-659, Sept 2008.
  9. Bin Zeng, Lu Yao, ZhiChen Chen, "A Network Intrusion Detection System with the Snooping Agents", International Conference on Computer Application and System Modelling, pp. 232-236, Oct 2013.
  10. Abebe Tesfahun, D. Lalitha Bhaskari, "Intrusion Detection using Random Forests Classifier with Smote and Feature Reduction", International Conference on Cloud & Ubiquitous Computing & Emerging Technologies, pp. 127-132, Nov 2013.
  11. Karen A. Garc´Ia, Raul Monroy, Luis A. Trejo, Carlos Mex-Perera, and Eduardo Aguirre, "Analyzing Log Files For Postmortem Intrusion Detection", In Proceeding of IEEE Transactions on Systems, Man, and Cybernetics-Part C: Applications and Reviews, Vol. 42, No. 6, pp. 1690-1704, Nov 2012.
  12. Wu Yang, Wei Wan , Lin Guo, and Le-Jun Zhang, “An Efficient Intrusion Detection Model Based on Fast Inductive Learning”, In Proceedings of the Sixth International Conference on Machine Learning and Cybernetics, Hong Kong, pp. 3249-3254, Aug 2007.
  13. M. Moorthy, Dr. S. Sathiyabama , "A Study of Intrusion Detection using Data Mining", In Proceeding of IEEE-International Conference on Advances In Engineering, Science and Management (ICAESM -2012), pp. 8-15, March 2012.
  14. Mohammadreza Ektefa, Sara Memar, Fatimah Sidi, Lilly Suriani Affendey, "Intrusion Detection Using Data Mining Techniques", International Conference on Information retrival & Knowledge Management, (CAMP),pp. 200-203,Mar 2010.
  15. Kapil Wankhade, Sadia Patka, "An Efficient Approach for Intrusion Detection Using Data Mining Methods", International Conference on Information Retrival & Knowledge Management, pp. 200-103,Mar 2010.
  16. Francisco Maciá-Pérez, J. Mora-Gimeno, "Network Intrusion Detection System Embeddedon a Smart Sensor", In Proceeding of IEEE Transactions on Industrial Electronics, Vol. 58, No. 3,pp. 722-732, Mar 2011.
  17. Carol J Fung, Jie Zhang, "Effective Acquaintance Management based on Bayesian Learning for Distributed Intrusion Detection Networks", In Proceeding of IEEE Transactions on Network and Service Management, Vol. 9, No. 3,pp. 320-332, September 2012.
  18. Fenye Bao, Ing-Ray Chen, MoonJeong Chang, and Jin-Hee Cho, "Hierarchical Trust Management for Wireless Sensor Networks and its Applications to Trust-Based Routing and Intrusion Detection", In Proceeding of IEEE Transactions on Network and Service Management, Vol. 9, No. 2, pp. 169-183, June 2012.
  19. Min Wei and Keecheon Kim, "Intrusion Detection Scheme Using Traffic Prediction forWireless Industrial Networks", Journal of Communications and Networks, Vol. 14, No. 3, pp. 310-318, June 2012.
  20. Quanyan Zhu, Carol Fung, Raouf Boutaba, Tamer Basar, "GUIDEX: A Game-Theoretic Incentive-Based Mechanism for Intrusion Detection Networks", IEEE Journal on Selected Areas In Communications, Vol. 30, No. 11, pp. 2220-2230, Dec 2012.
  21. Yun Wang, Weihuang Fu, and Dharma P. Agrawal, "Gaussian versus Uniform Distribution for Intrusion Detection in Wireless Sensor Networks", In Proceeding of IEEE Transactions on Parallel and Distributed Systems, Vol. 24, No. 2, pp. 342-355, Feb 2013.
  22. Weiming Hu, Jun Gao, Yanguo Wang, Ou Wu, and Stephen Maybank, "Online Adaboost-Based Parameterized Methods for Dynamic Distributed Network Intrusion Detection", In Proceeding of IEEE Transactions on Cybernetics, Vol. 44, No. 1, pp. 66-82, Jan 2014.
  23. Zhenwei Yu, Jeffrey J. P. Tsai, and Thomas Weigert, "An Automatically Tuning Intrusion Detection System", IEEE Transactions on Systems, Man, and Cybernetics - Part B: Cybernetics, Vol. 37, No. 2, pp. 373-384, April 2007.
  24. Pradhan M, Pradhan S K, Sahu S K, “ Anamoly Detection using Artificial Neural Network, International Journal of Engineering Sciences & Emerging Technologies,Volume 2, Issue 1, April 2012.
  25. Rayees, Q. Khan, Butt, Muheet A & Asger, M., Zaman M, 2015, Integrity Model based Intrusion Detection System: A Practical Approach, Inter Jour. of Comp. Science-IJCA”, ISSN: 2249-6645X, 4 : 1-7.
  26. www.cs/dal/ca/%7Eriyad/Dataset/DARPA99/DARPA99Week1.zip
Index Terms

Computer Science
Information Sciences

Keywords

Data Mining Intrusion Detection System Fuzzy C-Means Frequent Item Set Mining Artificial Bee Colony Algorithm Artificial Neural Network.