CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

An Adaptive Intrusion Detection Model based on Machine Learning Techniques

by Salima Omar, Asri Ngadi, Hamid H. Jebur
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 70 - Number 7
Year of Publication: 2013
Authors: Salima Omar, Asri Ngadi, Hamid H. Jebur
10.5120/11971-6640

Salima Omar, Asri Ngadi, Hamid H. Jebur . An Adaptive Intrusion Detection Model based on Machine Learning Techniques. International Journal of Computer Applications. 70, 7 ( May 2013), 1-5. DOI=10.5120/11971-6640

@article{ 10.5120/11971-6640,
author = { Salima Omar, Asri Ngadi, Hamid H. Jebur },
title = { An Adaptive Intrusion Detection Model based on Machine Learning Techniques },
journal = { International Journal of Computer Applications },
issue_date = { May 2013 },
volume = { 70 },
number = { 7 },
month = { May },
year = { 2013 },
issn = { 0975-8887 },
pages = { 1-5 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume70/number7/11971-6640/ },
doi = { 10.5120/11971-6640 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:32:13.277042+05:30
%A Salima Omar
%A Asri Ngadi
%A Hamid H. Jebur
%T An Adaptive Intrusion Detection Model based on Machine Learning Techniques
%J International Journal of Computer Applications
%@ 0975-8887
%V 70
%N 7
%P 1-5
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Intrusion detection continues to be an active research field. Even after 20 years of research, the intrusion detection community still faces several difficult problems. Detecting unknown patterns of attack without generating too many false alerts remains an unresolved problem. Although recently, several results have shown that there is a potential resolution to this problem. Anomaly detection is a key element of intrusion detection in which perturbations of normal behavior suggest the presence of intentionally or unintentionally induced attacks, faults, and defects. This paper proposes a hybrid machine learning model based on combining the unsupervised and supervised classification techniques. Clustering approach based on combining the K-means , fuzzy C-means and GSA algorithms to obtain the normal patterns of a user's activity, the technique is used as the first component for pre-classification to improve attack detection. Then, a hybrid classification approach of Support Vector Machine (SVM) and Gravitational Search Algorithm (GSA) algorithm will be used to enhance the detection accuracy. this research used the KDD CUP 1999 to get initial results, which were encouraging.

References
  1. Abarghouei ,A. , Ghanizadeh, A. , and hamsuddin, M. ," Advances of soft computing methods in edge detection", Int. J. Advance Soft Comput, Appl. , vol. 1, n. 2, 2010, 162-203.
  2. Bezdek,J. 1974. Fuzzy mathematics in pattern classification. Ph. D. thesis, Ithaca, NY: Cornell University.
  3. Chen ,Y. , and Ye, F. 2004. Particle swarm optimization algorithm and its application to clustering analysis. In Proc. The IEEE International Conference on Networking in Sensing and Control.
  4. Hua TANG, D. , and Zhuolin CAO, " Machine Learning-based Intrusion Detection Algorithms", In Journal of Computer Information Systems, Vol. 5, No. 6 ,1825-1831, 2009.
  5. Denning D,E. (1987). An Intrusion Detection Model. IEEE Transactions on Software Engineering. SE-13.
  6. Rashedi,E. , Nezamabadi ,H. , Saryazdi, S. , "Filter modeling using gravitational search algorithm " , Engineering Applications of Artificial Intelligence, to be published, 2010.
  7. Rashedi,E. , Nezamabadi,H. , Saryazdi, S. ," GSA: A gravitational search algorithm", Information Sciences, vol. 179, 2232-2248, 2009.
  8. Forrest, S. , Hofmeyr, S. , Somayaji, A. , and Longstaff, T. (1996). A sense of self for Unix Processes. In Proceedings of the 1996 IEEE Symposium on Security and Privacy. IEEE Computer Society.
  9. Giacinto, G. , Roli, F,. and Didaci, L. (2003a). " Fusion of multiple classifiers for intrusion detection in computer networks," Journal of Pattern Recognition, Vol. 24 , 1795-1803.
  10. Giorgio, G. , Fabio, R. , Luca, D,. 2007. Fusion of multiple classifiers for intrusion detection in computer networks, Proc. IEEE Conference in Network Security.
  11. Gosh, A. K. , Schwartzbard, A. , and Schatz, M. (1999). Learning Program Behavior Profiles for Intrusion Detection. In Proceeding of the Workshop on Intrusion Detection and Network Monitoring.
  12. Hossain, M. , and Bridges, S. (2001). A Framework for an Adaptive Intrusion Detection System With Data Mining. In Proceedings of the 13th. Annual Canadia Information Technology Security Symposium.
  13. Jiong Zhang, Mohammad Zulkernine. 2006. Anomaly based network intrusion detection with unsupervised outlier detection. Proc. IEEE Communication Society.
  14. Kim, J. , Bentley, P. , Aickelin, U. , Greensmith, J. , Tedesco G. , and Twycross, J. , " Immune System Approaches to Intrusion Detection – A Review", Natural Computing. 2007, 413-466.
  15. Shanghai ,L. , and Yingxu, L. 2009. A Data Mining Framework for Building Intrusion Detection Models Based on IPv6. In Proceedings of the 3rd International Conference and Workshops on Advances in Information Security and Assurance. Seoul, Korea, Springer-Verlag.
  16. Lee, W. , and Stolfo, S. 1998. Data mining approaches for intrusion detection. In Proceedings of the 7th USENIX security symposium .
  17. Mrudula, G. , Prakash, P. , and Kapil , W. 2010. A new data mining based network intrusion detection model. International Conference on Computer and Communication Technology.
  18. Mukkamala, R. , Gagnon ,J. , and Jaiodia, S. 2000. Integrating data mining techniques with intrusion detection methods. In Research Advances in Database and Information systems security.
  19. Peddabachigari,S. , Abraham,A. , C. , Grosan, and Thomas,J, " Modeling intrusion Detection system using hybrid In intelligent systems", Journal of Network and Computer Applications, 2007.
  20. Sun ,S. , and Wang ,Y. 2009. A Weighted Support Vector Clustering Algorithm and its Application. In Network Intrusion Detection In First International Workshop on Education Technology and Computer Science Vol. 1.
  21. Selim, S. , and Ismail, M. "K-means type algorithms: a generalized convergence theorem and characterization of local optimality'', IEEE Transaction of Pattern Analysis Machine Intelligent, 1984.
  22. Srinivas ,M. , Guadalupe,J. , and Amdrew,. S. 2002. Intrusion Detection using Neural Networks and Support Vector Machines. In Proceedings of the International Joint Conference on Neural Networks.
  23. Theodoros, L. , and Konstantinos, P. , " Data Mining Techniques for Network Intrusion Detection" System. In techrepublic January, 2007.
  24. Warrander, C. , Forrest, S. , and Pearlmutter, B. (1999). Detecting intrusions using system calls: alternative data models. In proceedings of the 1999 IEEE Symposium on Security and Privacy. IEEE Computer Society.
  25. Xu, X. , and Wang, X. (2005). An Adaptive Network Intrusion Detection Method Based on PCA and Support Vector Machines. Proceedings of First International Conference on Advanced Data Mining and Applications, ADMA 2005, Wuhan, China.
  26. Tsai, C. F. , Hsu, Y. F. , Lin, C. Y. and Lin, W. Y. (2009). Intrusion Detection by Machine Learning: A Review. Expert Systems with Applications. 36(10), 11994-12000.
  27. Mukkamala, S. , Sung A. H. and Abraham, A. (2003). Intrusion Detection Using Ensemble of Soft Computing Paradigms. Proceedings of 3rd. International Conference on Intelligent Systems Design and Applications. Advances in Soft Computing, Springer Verlag, Germany, 239-248.
Index Terms

Computer Science
Information Sciences

Keywords

Supervised Machine Learning Unsupervised Machine Learning Network Intrusion Detection