Open Access   Article Go Back

An Effective Approach for Improving Anomaly Intrusion Detection

Kumar J S1 , Appa Rao S S V2 , Subha Sree M3

Section:Review Paper, Product Type: Journal Paper
Volume-3 , Issue-10 , Page no. 92-98, Oct-2015

Online published on Oct 31, 2015

Copyright © Kumar J S, Appa Rao S S V, Subha Sree M . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Kumar J S, Appa Rao S S V, Subha Sree M, “An Effective Approach for Improving Anomaly Intrusion Detection,” International Journal of Computer Sciences and Engineering, Vol.3, Issue.10, pp.92-98, 2015.

MLA Style Citation: Kumar J S, Appa Rao S S V, Subha Sree M "An Effective Approach for Improving Anomaly Intrusion Detection." International Journal of Computer Sciences and Engineering 3.10 (2015): 92-98.

APA Style Citation: Kumar J S, Appa Rao S S V, Subha Sree M, (2015). An Effective Approach for Improving Anomaly Intrusion Detection. International Journal of Computer Sciences and Engineering, 3(10), 92-98.

BibTex Style Citation:
@article{S_2015,
author = {Kumar J S, Appa Rao S S V, Subha Sree M},
title = {An Effective Approach for Improving Anomaly Intrusion Detection},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {10 2015},
volume = {3},
Issue = {10},
month = {10},
year = {2015},
issn = {2347-2693},
pages = {92-98},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=712},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=712
TI - An Effective Approach for Improving Anomaly Intrusion Detection
T2 - International Journal of Computer Sciences and Engineering
AU - Kumar J S, Appa Rao S S V, Subha Sree M
PY - 2015
DA - 2015/10/31
PB - IJCSE, Indore, INDIA
SP - 92-98
IS - 10
VL - 3
SN - 2347-2693
ER -

VIEWS PDF XML
2477 2279 downloads 2408 downloads
  
  
           

Abstract

Intrusion Detection Systems (IDS) is a key part of system defense, where it identifies abnormal activities happening in a computer system. In general, the traditional intrusion detection relies on the extensive knowledge of security experts, in particular, on their familiarity with the computer system to be protected. To reduce this dependence, various data-mining, soft-computing and machine learning techniques have been proposed in recent years for the development of better intrusion detection systems. Many researchers used Conditional Random Fields and Layered Approach for purpose of intrusion detection. They also demonstrated that high attack detection accuracy can be achieved by using Conditional Random Fields and high efficiency by implementing the Layered approach. In the paper we explained a new method called fuzzy ARTMAP classifier (FAM) and clustering technique for effectively identifying the intrusion activities within a network. Processing huge data would make the system error prone, hence clustering the data into groups and then processing will result in having a better system. From each of the cluster, representative data is selected in the selective process for further processing. For classification process, layered fuzzy ARTMAP will have the better results when compared to other normal classifier algorithms. Finally the experiments and evaluations of the proposed intrusion detection system is using the KDD Cup 99 intrusion detection data set.

Key-Words / Index Term

Intrusion Detection System, Layered approach, Clustering, FAM

References

[1] Yao, J. T., S.L. Zhao, and L.V. Saxton, “A Study On Fuzzy Intrusion Detection”, In Proceedings of the Data Mining, Intrusion Detection, Information Assurance, And Data Networks Security, SPIE, Vol. 5812, pp. 23-30 ,28 March - 1 April, Orlando, Florida, USA, 2005.
[2] Nivedita Naidu and Dr.R.V.Dharaskar, “An Effective Approach to Network Intrusion Detection System using Genetic Algorithm”, International Journal of Computer Applications, Vol.1, No.3, pp.26–32, February 2010.
[3] Peyman Kabiri and Ali A. Ghorbani. Research on Intrusion Detection and Response: A Survey. International Journal of Network Security, 1(2):84–102, 2005
[4] B Mukherjee, L Todd Heberlein, K N Levitt, 1994. “Network intrusion detection. IEEE Network, Vol. 8, No. 3, pp.26–41,1994.
[5] J. Allen, A. Christie, and W. Fithen, “State Of the Practice of Intrusion Detection Technologies”, Technical Report, CMU/SEI-99-TR-028, 2000.
[6] Kapil Kumar Gupta, Baikunth Nath and Ramamohanarao Kotagiri, “Layered Approach Using Conditional Random Fields for Intrusion Detection”, IEEE Transactions on Dependable and Secure Computing, Vol. 7, No. 1, 2010.
[7]G. Gowrisona, K. Ramarb, K. Muneeswaranc, T. Revathic, " Minimal complexity attack classification intrusion detection system", Applied Soft Computing, vol 13, pp: 921–927, 2013.
[8]Shingo Mabu, Nannan Lu, Kaoru Shimada,KotaroHirasawa, " An Intrusion-Detection Model Based on Fuzzy Class-Association-Rule Mining Using Genetic Network Programming", IEEE Transactions On Systems, Man, And Cybernetics—Part C: Applications And Reviews, VOL. 41, NO. 1, PP: 130-139 , 2011
[9] Latifur Khan, MamounAwad, BhavaniThuraisingham, “A new intrusion detection system using support vector machines and hierarchical clustering”, The International Journal on Very Large Data Bases, Vol. 16, no. 4, October 2007.
[10] M. Bahrololum, E. Salahi and M. Khaleghi “Anomaly intrusion detection design using hybrid of unsupervised and supervised neural networks”, International Journal of Computer Networks & Communications, Vol.1, No.2, 2009.
[11] K.S. Anil Kumar and Dr. V. NandaMohan, " Novel Anomaly Intrusion Detection Using Neuro-Fuzzy Inference System ", IJCSNS International Journal 6 of Computer Science and Network Security, vol.8, no.8, pp.6-11 , August 2008.
[12] Shekhar R. Gaddam, Vir V. Phoha, Kiran S. Balagani, “K-Means+ID3: A Novel Method for Supervised Anomaly Detection by Cascading K-Means Clustering and ID3 Decision Tree Learning Methods”, IEEE Transactions on Knowledge and Data Engineering, Vol. 19, No. 3, pp. 345-354, 2007.
[13] Vipin Kumar, Himadri Chauhan and Dheeraj Panwar, “K-Means Clustering Approach to Analyze NSL-KDD Intrusion Detection Dataset” International Journal of Soft Computing and Engineering (IJSCE), pp. 2231-2307, Volume-3, Issue-4, September 2013
[14] Rachnakulhare and Divakar Singh, “Intrusion Detection System based on Fuzzy C Means Clustering and Probabilistic Neural Network”, International Journal of Computer Applications, Vol. 74, No.2, 2013.
[15]KDD Cup 1999. Available on: http://kdd.ics.uci.edu/databases/kddcup 99/kddcup99.html, Ocotber 2007.
[16] Jaskaranjit Kaur and Gurpreet Kaur, “Clustering Algorithms in Data Mining: A Comprehensive Study”, International Journal of Computer Science and Engineering , vol. 3 Issue.7, pp 57-61, July 2015.