CFP last date
20 May 2024
Reseach Article

A Network Intrusion Detection Framework based on Bayesian Network using Wrapper Approach

by Md Reazul Kabir, Abdur Rahman Onik, Tanvir Samad
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 166 - Number 4
Year of Publication: 2017
Authors: Md Reazul Kabir, Abdur Rahman Onik, Tanvir Samad
10.5120/ijca2017913992

Md Reazul Kabir, Abdur Rahman Onik, Tanvir Samad . A Network Intrusion Detection Framework based on Bayesian Network using Wrapper Approach. International Journal of Computer Applications. 166, 4 ( May 2017), 13-17. DOI=10.5120/ijca2017913992

@article{ 10.5120/ijca2017913992,
author = { Md Reazul Kabir, Abdur Rahman Onik, Tanvir Samad },
title = { A Network Intrusion Detection Framework based on Bayesian Network using Wrapper Approach },
journal = { International Journal of Computer Applications },
issue_date = { May 2017 },
volume = { 166 },
number = { 4 },
month = { May },
year = { 2017 },
issn = { 0975-8887 },
pages = { 13-17 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume166/number4/27656-2017913992/ },
doi = { 10.5120/ijca2017913992 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:13:34.673527+05:30
%A Md Reazul Kabir
%A Abdur Rahman Onik
%A Tanvir Samad
%T A Network Intrusion Detection Framework based on Bayesian Network using Wrapper Approach
%J International Journal of Computer Applications
%@ 0975-8887
%V 166
%N 4
%P 13-17
%D 2017
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Increasing internet usage and connectivity demands a network intrusion detection system combating cynical network attacks. Data mining therefore is a popular technique used by intrusion detection system to prevent the network attacks and classify the network events as either normal or attack. Our research study presents a wrapper approach for intrusion detection. In this framework Feature selection technique eliminate the irrelevant features to reduce the time complexity and build a better model to predict the result with a greater accuracy and Bayesian network works as a base classifier to predict the types of attack. Our experiment shows that the proposed framework exhibits a superior overall performance in terms of accuracy which is 98.2653 , error rate of 1.73 and keeps the false positive rate at a lower rate of 0.007. Our model performed better than other leading state-of-the-arts models such as KNN, Boosted DT, Hidden NB and Markov chain. The NSL-KDD is used as benchmark data set with Weka library functions in the experimental setup.

References
  1. Adel Sabry Eesa , Zeynep and Brifcani (2015). A novel feature-selection approach based on the cuttlefish optimization algorithm for intrusion detection systems in Expert Systems with Applications. Volume 42, Issue 5, Pages 2670-2679.
  2. A.M. Chandrashekhar, K. (2013). Fortification of hybrid intrusion detection system using variants of neural networks & support vector machines. International Journal of Network Security & Its Applications (IJNSA) .
  3. Chih-Fong Tsai, William Eberle , Chi-Yuan Chu. (2013), Genetic algorithms in feature and instance selection. Expert Systems with Applications, ELSEVIER
  4. C.M.Bishop. (1995). Neural networks for pattern recognition. England: Oxford University.
  5. Carlos A. Catania, F. B. (2012). An autonomous labeling approach to support vector machines algorithms for network traffic anomaly detection. Expert Systems with Applications, ELSEVIER .
  6. Chengpo Mua, Y. L. (2010). An intrusion response decision making model based on hierarchical. Expert Systems with Applications, ELSEVIER .
  7. Chih-Fong Tsai, Y.-F. H.-Y.-Y. (2009). Intrusion detection by machine learning: A review. expert systems with applications, ELSEVIER .
  8. D. Sa´nchez, M. V. (2009). Association rules applied to credit card fraud detection. Expert Systems with Applications,ELSEVIER .
  9. Dahlia Asyiqin Ahmad Zainaddin, Z. M. (2013). HYBRID OF FUZZY CLUSTERING NEURAL NETWORK OVER NSL DATASET FOR INTRUSION DETECTION SYSTEM. Journal of Computer Science .
  10. Dewan Md. Farid, L. Z. (2013). An Adaptive Ensemble Classifier for Mining Concept-Drifting Data Streams. Expert systems with Applications,ELSEVIER .
  11. Dewan Md. Farid, M. Z. (2011). Adaptive Intrusion Detection based on Boosting and. International Journal of Computer Applications
  12. Feng Jiang, Y. S. (2009). Some issues about outlier detection in rough set theory. expert systems with application,ELSEVIER .
  13. ] G. Davanzo, E. M. (2011). Anomaly detection techniques for a web defacement monitoring service. Expert Systems with Applications,ELSEVIER .
  14. Gisung Kim, S. L. (2013). A novel hybrid intrusion detection method integrating anomaly detection with misuse detection. Expert Systems with Applications,ELSEVIER
  15. Han-Ching Wu, S.-H. S. (2010). Neural networks-based detection of stepping-stone intrusion. Expert Systems with Applications,ELSEVIER .
  16. Haq NF, Onik AR, Shah FM. An ensemble framework of anomaly detection using hybridized feature selection approach (HFSA). InSAI Intelligent Systems Conference (IntelliSys), 2015 2015 Nov 10 (pp. 989-995). IEEE.
  17. Haq NF, Onik AR, Shah FM. "Application of Machine Learning Approaches in Intrusion Detection System: A Survey." (IJARAI) International Journal of Advanced Research in Artificial Intelligence.
  18. Onik AR, Haq NF, Alam L, Mamun TI. An Analytical Comparison on Filter Feature Extraction Method in Data Mining using J48 Classifier. International Journal of Computer Applications. 2015 Jan 1;124(13).
  19. Onik AR, Haq NF, Mustahin W. Cross-breed type Bayesian network based intrusion detection system (CBNIDS). InComputer and Information Technology (ICCIT), 2015 18th International Conference on 2015 Dec 21 (pp. 407-412). IEEE
  20. Yinhui Li, J. X. (2012). An efficient intrusion detection system based on support vector machines and gradually feature removal method. Expert Systems with Applications, ELSEVIER .
  21. Yung-Tsung Hou, Y. C.-S.-M. (2010). Malicious web content detection by machine learning. expert systems with applications, ELSEVIER .
  22. Yusuf Sahin, S. B. (2013). A cost-sensitive decision tree approach for fraud detection. Expert Systems with Applications, ELSEVIER.
  23. Zimmermann, H.-J. (2010). Fuzzy set theory. Advanced Reviw Zimmermann, H.-J. (2010). Fuzzy set theory.
Index Terms

Computer Science
Information Sciences

Keywords

Intrusion Detection System Feature Selection Genetic Search Bayesian Network Weka NSL-KDD.