CFP last date
22 July 2024
Call for Paper
August Edition
IJCA solicits high quality original research papers for the upcoming August edition of the journal. The last date of research paper submission is 22 July 2024

Submit your paper
Know more
Reseach Article

KCMC: A Hybrid Learning Approach for Network Intrusion Detection using K-means Clustering and Multiple Classifiers

by S. Vahid Farrahi, Marzieh Ahmadzadeh
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 124 - Number 9
Year of Publication: 2015
Authors: S. Vahid Farrahi, Marzieh Ahmadzadeh
10.5120/ijca2015905365

S. Vahid Farrahi, Marzieh Ahmadzadeh . KCMC: A Hybrid Learning Approach for Network Intrusion Detection using K-means Clustering and Multiple Classifiers. International Journal of Computer Applications. 124, 9 ( August 2015), 18-23. DOI=10.5120/ijca2015905365

@article{ 10.5120/ijca2015905365,
author = { S. Vahid Farrahi, Marzieh Ahmadzadeh },
title = { KCMC: A Hybrid Learning Approach for Network Intrusion Detection using K-means Clustering and Multiple Classifiers },
journal = { International Journal of Computer Applications },
issue_date = { August 2015 },
volume = { 124 },
number = { 9 },
month = { August },
year = { 2015 },
issn = { 0975-8887 },
pages = { 18-23 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume124/number9/22131-2015905365/ },
doi = { 10.5120/ijca2015905365 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:13:56.556793+05:30
%A S. Vahid Farrahi
%A Marzieh Ahmadzadeh
%T KCMC: A Hybrid Learning Approach for Network Intrusion Detection using K-means Clustering and Multiple Classifiers
%J International Journal of Computer Applications
%@ 0975-8887
%V 124
%N 9
%P 18-23
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

A network Intrusion Detection System (IDS) is a security tool that acts as a defensive line. One of the most important challenges in network intrusion detection research area is designing an accurate intrusion detection system in terms of high detection rate, high accuracy and low false alarm rate. Hybrid learning approaches employ to deal with this challenge since, they have promising results in terms of detection rate, accuracy and false alarm rate. This paper, proposed a general structure of a hybrid learning approach. Then, the proposed approach has been implemented using K-means Clustering and Multiple Classifiers (KCMC). The data have been partitioned based on K-means clustering algorithm. Then, each partition classified using a distinct classifier. Naïve Bayes, Support Vector Machines and OneR classification algorithms have been used as the classifiers. The proposed hybrid approach has better results comparing to single classifiers in terms of detection rate, accuracy and false alarm rate. The detection rate of the proposed hybrid learning approach is 99.50%.

References
  1. P. Garcia-Teodoro, J. Diaz-Verdejo, G. Maciá-Fernández, and E. Vázquez, "Anomaly-based network intrusion detection: Techniques, systems and challenges," computers & security, vol. 28, pp. 18-28, 2009.
  2. E. Biermann, E. Cloete, and L. M. Venter, "A comparison of intrusion detection systems," Computers & Security, vol. 20, pp. 676-683, 2001.
  3. A. Deepa and V. Kavitha, "A comprehensive survey on approaches to intrusion detection system," Procedia Engineering, vol. 38, pp. 2063-2069, 2012.
  4. A. Patcha and J.-M. Park, "An overview of anomaly detection techniques: Existing solutions and latest technological trends," Computer Networks, vol. 51, pp. 3448-3470, 2007.
  5. W. Feng, Q. Zhang, G. Hu, and J. X. Huang, "Mining network data for intrusion detection through combining SVMs with ant colony networks," Future Generation Computer Systems, vol. 37, pp. 127-140, 2014.
  6. W. Lee, S. J. Stolfo, P. K. Chan, E. Eskin, W. Fan, M. Miller, et al., "Real time data mining-based intrusion detection," in DARPA Information Survivability Conference & Exposition II, 2001. DISCEX'01. Proceedings, 2001, pp. 89-100.
  7. K. Wankhade, S. Patka, and R. Thool, "An Overview of Intrusion Detection Based on Data Mining Techniques," in Communication Systems and Network Technologies (CSNT), 2013 International Conference on, 2013, pp. 626-629.
  8. M. Jianliang, S. Haikun, and B. Ling, "The application on intrusion detection based on k-means cluster algorithm," in Information Technology and Applications, 2009. IFITA'09. International Forum on, 2009, pp. 150-152.
  9. Z. Muda, W. Yassin, M. Sulaiman, and N. Udzir, "Intrusion detection based on K-Means clustering and Naïve Bayes classification," in Information Technology in Asia (CITA 11), 2011 7th International Conference on, 2011, pp. 1-6.
  10. S. K. Sharma, P. Pandey, S. K. Tiwari, and M. S. Sisodia, "An improved network intrusion detection technique based on k-means clustering via Naïve bayes classification," in Advances in Engineering, Science and Management (ICAESM), 2012 International Conference on, 2012, pp. 417-422.
  11. Z. Muda, W. Yassin, M. N. Sulaiman, and N. Udzir, "Intrusion detection based on k-means clustering and OneR classification," in Information Assurance and Security (IAS), 2011 7th International Conference on, 2011, pp. 192-197.
  12. Y. Emami, M. Ahmadzadeh, M. Salehi, and S. Homayoun, "Efficient Intrusion Detection using Weighted K-means Clustering and Naïve Bayes Classification," Journal of Emerging Trends in Computing and Information Sciences, vol. 5, pp. 620-623, 2014.
  13. R. M. Elbasiony, E. A. Sallam, T. E. Eltobely, and M. M. Fahmy, "A hybrid network intrusion detection framework based on random forests and weighted k-means," Ain Shams Engineering Journal, vol. 4, pp. 753-762, 2013.
  14. J. Hussain, S. Lalmuanawma, and L. Chhakchhuak, "A Novel Network Intrusion Detection System Using Two-Stage Hybrid Classification Technique," IJCCER, vol. 3, pp. 16-27, 2015.
  15. G. Kim, S. Lee, and S. Kim, "A novel hybrid intrusion detection method integrating anomaly detection with misuse detection," Expert Systems with Applications, vol. 41, pp. 1690-1700, 2014.
  16. A. K. Jain, "Data clustering: 50 years beyond K-means," Pattern recognition letters, vol. 31, pp. 651-666, 2010.
  17. P.-N. Tan, M. Steinbach, and V. Kumar, Introduction to data mining vol. 1: Pearson Addison Wesley Boston, 2006.
  18. KDD cup99 intrusion detection data set. Available: http://kdd.ics.uci.edu/databases/kddcup99/kddcup.data_10_percent.gz
Index Terms

Computer Science
Information Sciences

Keywords

Network Intrusion Detection Hybrid Learning Clustering Multiple Classifiers Network Security Data Mining