CFP last date
20 May 2024
Reseach Article

Development and Assessment of Intrusion Detection System using Machine Learning Algorithm

Published on November 2012 by Vinod Kumar, Om Prakash Sangwan
Issues and Challenges in Networking, Intelligence and Computing Technologies
Foundation of Computer Science USA
ICNICT - Number 6
November 2012
Authors: Vinod Kumar, Om Prakash Sangwan
efc87d94-985a-4428-ad58-c8e792859fd9

Vinod Kumar, Om Prakash Sangwan . Development and Assessment of Intrusion Detection System using Machine Learning Algorithm. Issues and Challenges in Networking, Intelligence and Computing Technologies. ICNICT, 6 (November 2012), 33-36.

@article{
author = { Vinod Kumar, Om Prakash Sangwan },
title = { Development and Assessment of Intrusion Detection System using Machine Learning Algorithm },
journal = { Issues and Challenges in Networking, Intelligence and Computing Technologies },
issue_date = { November 2012 },
volume = { ICNICT },
number = { 6 },
month = { November },
year = { 2012 },
issn = 0975-8887,
pages = { 33-36 },
numpages = 4,
url = { /specialissues/icnict/number6/9455-1079/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Special Issue Article
%1 Issues and Challenges in Networking, Intelligence and Computing Technologies
%A Vinod Kumar
%A Om Prakash Sangwan
%T Development and Assessment of Intrusion Detection System using Machine Learning Algorithm
%J Issues and Challenges in Networking, Intelligence and Computing Technologies
%@ 0975-8887
%V ICNICT
%N 6
%P 33-36
%D 2012
%I International Journal of Computer Applications
Abstract

In today's world, the internet is an important part of our life. People cannot think of a single moment without the existence of the internet. With the increasing involvement of the internet in our daily life, it is very important to make it secure. Now to make communication system more secure there is a need of Intrusion Detection Systems which can be roughly classified as anomaly-based detection systems and signature-based detection systems. In the paper we presents a simple and robust method for intrusion detection in computer networks based on Principal Component Analysis (PCA) where each network connection is transformed into an input data vector. PCA is used to reduce the high dimensional data vector to low dimensional data vector and then detection is done in less dimensional space with high efficiency and low use of system resources. We have used KDD Cup 99 dataset for experiment and result shown that this approach is promising in terms of detection accuracy. It is also effective to identify most known attacks as well as new attacks. However, a frequent update for both user profiles and attacks databases is crucial to improve the identification rates.

References
  1. D. E. Denning. 1987. An Intrusion-Detection Model. IEEE transactions on software engineering, Volume : 13 Issue: 2.
  2. Emmanuel Hooper. 2007. An Intelligent Intrusion Detection and Response System Using Hybrid Ward Hierarchical Clustering Analysis, International Conference on Multimedia and Ubiquitous Engineering, in IEEE, 1187-1192.
  3. Guan Xin and Li Yun-jie. 2010. A new Intrusion Prevention Attack System Model based on Immune Principle, International Conference on e-Business and Information System Security (EBISS), in IEEE, 1-4.
  4. I. T. Jolliffe. 2002. Principal Component Analysis, 2nd Edition,Springer-Verlag, NY.
  5. J. P. Anderson. 1972. Computer security technology planning study. Technical Report, ESDTR-73-51, United States Air Force, Electronic Systems Division.
  6. J. P. Anderson. 1980. Computer Security Threat Monitoring and Surveillance. Technical Report, James P. Anderson Company, Fort Washington, Pennsylvania.
  7. Jonathon Shlens. 2009. A Tutorial on Principal Component Analysis. Version 3. 01.
  8. R Rangadurai Karthick, Vipul P. Hattiwale and Balaraman Ravindran, 2012. Science Adaptive Network Intrusion Detection System using a Hybrid Approach, Fourth International Conference on Communication Systems and Networks (COMSNETS), in IEEE, pp. 1-7.
  9. Ronald L. Krutz, and Russell Dean Vines. 2010. Cloud Security: A Comprehensive Guide To Secure Cloud Computing, e-book published by Wiley Publishing, Inc. , pp. 61-169.
  10. Sodiya, A and Akinwale, A. 2004. A new two - tiered strategy to intrusion detection. Information Management and Computer Security, Volume: 12 Issue: 1, 27-44.
  11. The third international knowledge discovery and data mining tools competition dataset (1999), "KDD99-Cup", available: http://kdi. ics. uci. edu/databases/kddcup99/kddcup99. html
  12. V. Paxson. 1988. Bro: A system for detecting network intruders in real-time, In Proceedings of the 7th USENIX Security Symposium, San Antonio, TX.
  13. W. Lee, S. J. Stolfo, and K. Mok. 1999. Data mining in work flow environments: Experiences in intrusion detection, In Proceedings of the 1999 Conference on Knowledge Discovery and Data Mining (KDD-99).
  14. Zhou, J. , Carlson, A and Bishop, M. 2005. Verify Results of Network Intrusion Alerts Using Lightweight Protocol Analysis, Proceedings of the 21st Annual Computer Security and Applications Conference (ACSAC ).
Index Terms

Computer Science
Information Sciences

Keywords

Network Security Pca Nids Kdd Data Set