CFP last date
20 May 2024
Reseach Article

New Scheme to Identify Intrusion Outliers by Machine Learing Technique

by M. Thangamani, E. T. Venkatesh, A. Kalayana Saravanan
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 84 - Number 13
Year of Publication: 2013
Authors: M. Thangamani, E. T. Venkatesh, A. Kalayana Saravanan
10.5120/14635-1448

M. Thangamani, E. T. Venkatesh, A. Kalayana Saravanan . New Scheme to Identify Intrusion Outliers by Machine Learing Technique. International Journal of Computer Applications. 84, 13 ( December 2013), 13-16. DOI=10.5120/14635-1448

@article{ 10.5120/14635-1448,
author = { M. Thangamani, E. T. Venkatesh, A. Kalayana Saravanan },
title = { New Scheme to Identify Intrusion Outliers by Machine Learing Technique },
journal = { International Journal of Computer Applications },
issue_date = { December 2013 },
volume = { 84 },
number = { 13 },
month = { December },
year = { 2013 },
issn = { 0975-8887 },
pages = { 13-16 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume84/number13/14635-1448/ },
doi = { 10.5120/14635-1448 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:00:48.792380+05:30
%A M. Thangamani
%A E. T. Venkatesh
%A A. Kalayana Saravanan
%T New Scheme to Identify Intrusion Outliers by Machine Learing Technique
%J International Journal of Computer Applications
%@ 0975-8887
%V 84
%N 13
%P 13-16
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In network administration, computers and network systems need to be protected against malicious attacks. The success of an intrusion detection system depends on the selection of the appropriate features in detecting the intrusion activity. The selection of unnecessary features may cause computational issues and reduce the accuracy of detection. In the existing work, a novel detection approach is used through a one-class learning algorithm based on support vector machine classification. It can be also used in a Bayesian framework to estimate the posterior class probabilities of test data with unknown class. This algorithm can detect the system anomalies and monitor the health of a system. It does not allow updating the training data with new information. Therefore, the accuracy of the algorithm is low for the test data. The proposed work aims to improve the performance of attack detection and to reduce the false-alarm rate using hybrid classifier. This approach effectively identifies the set of attacks such as Denial of Service, Probe, and User to Root and Remote to Local attacks. In addition, an Experimental evaluation is carried out to compare the performance of existing classifier with the proposed Decision tree-Bayesian network classifier.

References
  1. ArunHodigere et al (2001),"Intrusion Detection System",shiraz university.
  2. Christopher Kruegel,DarrenMutz, William Robertson, and FrerickValeur(2003), "Bayesian Event Classification for Intrusion Detection", Proceedings of 19th Anniversary of Computer Security Applications Conference,pp. 14-23.
  3. Dorothy E. Denning, and P. G. Neumann (1985), "Requirement and model for IDES- A real time intrusion detection system," Computer Science Laboratory, SRI International, Menlo Park, Technical Report No. 83F83-01-00.
  4. F. Gonzalez and D. Dasgupta (2003),"Anomaly Detection using real-valued negative selection",Genetic Programming and Evolvable Machines, Volume 4, pp-383-403.
  5. Garci'a-TeodoroP,Di'az-Verdejo J, and Macis'-Ferna'ndez G(2009), "Anomaly-based network intrusion detection: Techniques,Systems,and Challenges", International journals on Computers and Security, Vol. 28,pp. 18-28.
  6. HuyAnhNguyen,Deokjai Choi, "Application of Data Mining to Network Intrusion Detection: Classifier Selection Model".
  7. James P. Anderson (1980),"Computer security threat monitoring and surveillance," Technical Report 98-17,Fort Washington, Pennsylvania, USA.
  8. Jiawei Han and MichelineKamber, "Data Mining: Concepts and Techniques", 2ndEdition,University of IIIinois.
  9. John Mill,Atsushi Inoue(2006), "Support Vector Classifiers and Network Intrusion Detection", Eastern Washington University press.
  10. J. Kwok(2006), "Moderating the outputs of support vector machine classifiers", IEEE Transactions on Neural networks, Volume 10, pp. 1018–1031.
  11. S. Marsland (2003), "Novelty detection in learning systems ", Neural computing surveys, Volume 3, pp. 157-195.
  12. SrilathaChebrolu (2005), 'Feature deduction and ensemble design of intrusion detection systems', Elsevier Journal of Computers & Security Vol. 24/4, pp. 295-307.
  13. Sudipto Banerjee and AnrdrewO. Finley (2009), " Bayesian Linear Models", University of Minnesota,U. S. A.
  14. Vasilis A. Sotiris, Peter W. Tse, and Michael G. Pecht (2010), "Anomaly Detection Through a Bayesian Support Vector Machine," IEEE Transactions on Reliability, volume 59, no. 2, pp. 277–286.
  15. WEKA: Data Mining Software in Java (2008), ttp://www. cs. waikato. ac. nz/ml/weak
  16. Wenke Lee, S. Stolfo, and K. Mok (1999) , "A Data Mining Framework for Building intrusion Detection Model ", Proceedings of IEEE symposium, Security and Privacy, pp 120-132.
  17. WillmottSteveng, Ackleso . R, Davis, David R. Legate and Clinton M. Rowe(1985), "Statistics for the Evaluation and Comparison of models," journal of Geophysical Research, vol. 90, no. C5, pages 8995-9005.
  18. F. Angiulli, S. Basta, and C. Pizzuti, "Distance-based detection and prediction of outliers," IEEE Transactions on Knowledge and Data Engineering, vol. 18, no. 2, pp. 145–160, 2006.
  19. Derisstiawan, ala'yaseenibrahimshakhatreh (2012) , " intrusion prevention system: a survey", Journal of Theoretical and Applied Information Technology, issue:1, Vol. 40, Pp. 44-54.
  20. Ganapathy . S, Yogesh. P and Kannan . A (2012), "Intelligent Agent-Based Intrusion Detection System Using Enhanced Multiclass SVM", Computational Intelligence and Neuroscience, Hindawi Publishing Corporation, pp. 1-10.
  21. Thangamani . M and Thangaraj . P,"Survey on Text Document Clustering",International Journal of Computer Science and Information Security,vol. 8(4),2010.
  22. Thangamani, M. and Thangaraj, P. "Integrated Clustering and Feature Selection Scheme for Text Documents", International Journal of Computer Science, Vol. 6, Issue 5, pp. 536-541, 2010.
  23. Thangamani. M and Thangaraj. P, "Effective fuzzy semantic clustering scheme for decentralized network through multidomain ontology model", International Journal of Metadata, Semantics and Ontologies, Interscience Vol. 7, Issue 2, pp. 131-139, December 2012 Interscience publication
  24. Thangamani. M and Thangarj. P. "Fuzzy ontology for document clustering based on genetic Algorithm", International Journal of Applied mathematics and information science, Vol. 4, Issue 7, pp. 1563-1574, 2013.
  25. Thangamani. M and Thangarj. P. "Effective Fuzzy Ontology for Distributed Document Using Non-Dominated Ranked Genetic Algorithm", International Journal of Intelligent Information Technologies (JIIT), Vol. 7 (4), pp. 26-46, 2011
Index Terms

Computer Science
Information Sciences

Keywords

New Scheme