CFP last date
20 June 2024
Reseach Article

Performance Analysis of Semi-Supervised Intrusion Detection System

Published on December 2011 by V. K. Pachghare, Vaibhav K Khatavkar, Parag Kulkarni
Network Security and Cryptography
Foundation of Computer Science USA
NSC - Number 4
December 2011
Authors: V. K. Pachghare, Vaibhav K Khatavkar, Parag Kulkarni
262d0ecd-911d-45f7-80b9-8a38c55c329d

V. K. Pachghare, Vaibhav K Khatavkar, Parag Kulkarni . Performance Analysis of Semi-Supervised Intrusion Detection System. Network Security and Cryptography. NSC, 4 (December 2011), 15-19.

@article{
author = { V. K. Pachghare, Vaibhav K Khatavkar, Parag Kulkarni },
title = { Performance Analysis of Semi-Supervised Intrusion Detection System },
journal = { Network Security and Cryptography },
issue_date = { December 2011 },
volume = { NSC },
number = { 4 },
month = { December },
year = { 2011 },
issn = 0975-8887,
pages = { 15-19 },
numpages = 5,
url = { /specialissues/nsc/number4/4344-spe042t/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Special Issue Article
%1 Network Security and Cryptography
%A V. K. Pachghare
%A Vaibhav K Khatavkar
%A Parag Kulkarni
%T Performance Analysis of Semi-Supervised Intrusion Detection System
%J Network Security and Cryptography
%@ 0975-8887
%V NSC
%N 4
%P 15-19
%D 2011
%I International Journal of Computer Applications
Abstract

Supervised learning algorithm for Intrusion Detection needs labeled data for training. Lots of data is available through internet, network and host. But this data is unlabeled data. The availability of labeled data needs human expertise which is costly. This is the main hurdle for developing supervised intrusion detection systems. We can intelligently use both labeled and unlabeled data for intrusion detection. Semi-supervised learning has attracted the attention of the researcher working in Intrusion Detection using machine learning. Our goal is to improve the classification accuracy of any given supervised classifier algorithm by using the limited labeled data and large unlabeled data. The key advantage of the proposed semi-supervised learning approach is to improve the performance of supervised classifier. The results show that the performance of the proposed semi-supervised algorithm is better than the state-of the- art supervised learning algorithms. We compare the performance of our DS-AdaBoost algorithm as well as 5 standard algorithms available in WEKA for supervised and semi-supervised approach.

References
  1. R. Heady, G. Luger, A. Maccabe, and M. Servilla, "The Architecture of a Network Level Intrusion Detection System", Technical report, Department of Computer Science, University of New Mexico, August 1990.
  2. Zissman, M. 1998/99 DARPA Intrusion Detection Evaluation datasets. MIT Lincoln Laboratory, URL: http://www.ll.mit.edu/IST/ideval/data/data_index.html.
  3. Yarowsky, D. (1995). Unsupervised word sense disambiguation rivaling supervised methods. Proceedings of the 33rd Annual Meeting of the Association for Computational Linguistics (pp. 189–196).
  4. Blum, A., & Mitchell, T. (1998). Combining labeled and unlabeled data with co-training. COLT: Proceedings of the Workshop on Computational Learning Theory.
  5. Vapnik, V. (1998). Statistical learning theory. Wiley-Interscience.
  6. Lawrence, N. D., & Jordan, M. I. (2005). Semi-supervised learning via Gaussian processes. In L. K. Saul, Y. Weiss and L. Bottou (Eds.), Advances in neural information processing systems 17. Cambridge, MA: MIT Press.
  7. Xiaojin Zhu. Semi-Supervised Learning Literature Survey
  8. Zhu, X., & Ghahramani, Z. (2002). Towards semi-supervised classification with Markov random fields (Technical Report CMU-CALD-02-106). Carnegie Mellon University.
  9. Zhu, X., Ghahramani, Z., & Lafferty, J. (2003a). Semi-supervised learning using Gaussian fields and harmonic functions. The 20th International Conference on Machine Learning (ICML).
  10. Kemp, C., Griffiths, T., Stromsten, S., & Tenenbaum, J. (2003). Semi-supervised learning with trees. Advances in Neural Information Processing System 16.
  11. Nasraoui O. and Leon E., “Anomaly Detection Based on Unsupervised Niche Clustering with Application to Network Intrusion Detection” Proceedings of the 2004 Congress on Evolutionary Computation(CEC2004), IEEE press, Jun.2004, pp. 502-508. doi:10.1109/CEC.2004.1330898
  12. Chien-Yi Chiu, Yuh-Jye Lee, Chien-Chung, Chang, Wen-Yang Luo, and Hsiu-Chuan Huang, “Semi-supervised Learning for False Alarm Reduction”, P. Perner (Ed.): ICDM 2010, LNAI 6171, , 2010.@Springer-Verlag Berlin Heidelberg 2010, pp. 595–605
  13. Schonlau, M., DuMouchel, W., Ju, W.H., Karr, A.F., Theus, M., Vardi, Y.: Computer intrusion: Detecting masquerades. Statistical Science 16 (2001) 58–74
  14. Gao Xiang, Wang Min, “Applying Semi-supervised cluster algorithm for anomaly detection”, Third International Symposium on Information Processing, 978-0-7695-4261-4/10 $26.00 © 2010 IEEE
  15. Qiang Wang Vasileios Megalooikonomou, “A Clustering Algorithm for Intrusion Detection”,
  16. Andrew H. Sung & Srinivas Mukkamala, “Feature Selection for Intrusion Detection using Neural Networks and Support Vector Machines”, TRB 2003 Annual Meeting CD-ROM
  17. Ching-Hao Mao, Hahn-Ming Lee, Devi Parikh, Tsuhan Chen, Si-Yu Huang: Semi-supervised co-training and active learning based approach for multi-view intrusion detection. Proceedings of the 2009 ACM symposium on Applied Computing SAC 09 (2009) : 2042-2048
  18. Mallapragada, P. K., Jin, R., Jain, A. K., and Liu, Y. (2007). Semiboost: Boosting for semi-supervised learning. Technical report, Department of Comp. Science and Engineering, Michigan State University
  19. Yusufovna, S.F. Integrating Intrusion Detection System and Data Mining, International Symposium on Ubiquitous Multimedia Computing , 2008
  20. Pavan Kumar Mallapragada et al., “SemiBoost: Boosting for Semi-supervised Learning”, IEEE Transactions on Pattern Analysis and Machine Intelligence
  21. Yarowsky, David. 1995. Unsupervised word sense disambiguation rivaling supervised methods. In Proceedings of the 33rd Annual Meeting of the Association for Computational Linguistics, pages 189–196.
  22. NSL data set for IDS www.iscx.ca/NSL-KDD/
  23. Weka a Data mining tool www.cs.waikato.ac.nz/ml/weka
Index Terms

Computer Science
Information Sciences

Keywords

Intrusion Detection supervised learning semi-supervised learning pattern recognition