CFP last date
20 December 2024
Reseach Article

Partial Least Square based Improved Intrusion Detection System

by S. M. Sangve, U. V. Kulkarni
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 171 - Number 8
Year of Publication: 2017
Authors: S. M. Sangve, U. V. Kulkarni
10.5120/ijca2017915150

S. M. Sangve, U. V. Kulkarni . Partial Least Square based Improved Intrusion Detection System. International Journal of Computer Applications. 171, 8 ( Aug 2017), 29-34. DOI=10.5120/ijca2017915150

@article{ 10.5120/ijca2017915150,
author = { S. M. Sangve, U. V. Kulkarni },
title = { Partial Least Square based Improved Intrusion Detection System },
journal = { International Journal of Computer Applications },
issue_date = { Aug 2017 },
volume = { 171 },
number = { 8 },
month = { Aug },
year = { 2017 },
issn = { 0975-8887 },
pages = { 29-34 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume171/number8/28203-2017915150/ },
doi = { 10.5120/ijca2017915150 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:18:55.446019+05:30
%A S. M. Sangve
%A U. V. Kulkarni
%T Partial Least Square based Improved Intrusion Detection System
%J International Journal of Computer Applications
%@ 0975-8887
%V 171
%N 8
%P 29-34
%D 2017
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Various Artificial Intelligence (AI) based computing techniques for intrusion detection has been proposed using popular large-scale datasets like DARPA 98 and KDD Cup 99. However, AI based systems such as using representative instances are computationally inefficient. In this paper, the computationally efficient approach is proposed for anomaly detection by combining Partial Least Square (PLS) and technique of extracting representative instances. The PLS helps in feature selection and provides dimensionality reduction. Further, to decline the processing time the representative instances are properly chosen from the data set before classification. The classic instances are selected from the subsets of data which are obtained by Centroid-based partitioning technique. The system utilizes these paradigmatic instances as a training set. Finally, KNN classifier is trained using these paradigmatic instances. The results obtained using the proposed approach indicates a considerable fall in the processing time and space utilization.

References
  1. Shon T, Moon J, “A hybrid machine learning approach to network anomaly detection,” Information Sciences 177(2007):3799-3821.
  2. Bouzida Y, Cuppens F, Cuppens-Boulahia N, Gombault S, “Efficient intrusion detection using principal component analysis,”Proceedings of the 3eme Conference surla Scurit et Architectures Rseaux (SAR) 2004.
  3. Pavel Laskov, Patrick Dussel, Christin Schafer and Konrad Rieck, “Learning intrusion detection: supervised or unsupervised?,”iciap, 2005.
  4. Garcia-Teodoro P, Diaz-Verdejo J, Macia -Fernandez G, Vazquez E., “Anomaly-based network intrusion detection: techniques, systems and challenges,” Computers & Security 28(2009):18-28.
  5. Tsai CF, Hsu YF, Lin CY, Lin WY, “Intrusion detection by machine learning: a review,” Expert Systems with Applications 36(2009):11994-12000.
  6. Su MY, “Using clustering to improve the KNN-based classifiers for online anomaly network traffic identification,” Journal of Network and Computer Application 34 (2011):722-730.
  7. Davis JJ, Clark AJ, “ Datapreprocessing for anomaly based network intrusion detection: a review,” Computers & Security 30(2011):353-375.
  8. Chun Guo, Ya-Jian Zhou, Yuan Ping, Shou-Shan Luo, Yu-Ping Lai, Zhong-Kun Zhang, “Efficient intrusion detection using representative instances,” Computers & Security 39 (2013): 255 -267.
  9. Tamer F. Ghanem, Wail S. Elkilani, Hatem M. Abdul-kader, “A hybrid approach for efficient anomaly detection using metaheuristic methods,” Journal of Advanced Research (2015) 6, 609-619.
  10. Kamran Shafi, Hussein A. Abbass, “An adaptive genetic-based signature learning system for intrusion detection,” Expert Systems with Applications 36 (2009) 12036–12043.
  11. Pedro Casas, Johan Mazel, Philippe Owezarski, “Unsupervised Network Intrusion Detection Systems: Detecting the Unknown without Knowledge,” Computer Communications 35 (2012) 772–783.
  12. Jungsuk Song, Hiroki Takakura, Yasuo Okabe, Koji Nakao, “Toward a more practical unsupervised anomaly detection system,” Information Sciences 231 (2013) 4–14.
  13. Armin Daneshpazhouh, Ashkan Sami, “Entropy-based outlier detection using semi-supervised approach with few positive examples,” Pattern Recognition Letters 49 (2014) 77–84.
  14. Shelly Xiaonan Wu, Wolfgang Banzhaf, “The use of computational intelligence in intrusion detection systems: A review,” Applied Soft Computing 10 (2010) 1–35.
  15. Shi-Jinn Horng, Ming-Yang Su, Yuan-Hsin Chen, Tzong-Wann Kao, Rong-Jian Chen, Jui-Lin Lai, Citra Dwi Perkasa, “ A novel intrusion detection system based on hierarchical clustering and support vector machines,” Expert Systems with Applications 38 (2011) 306–313.
  16. Chen WH, Hsu SH, Shen HP, “Application of SVM and ANN for intrusion detection,” Computer Operation Research 2005; 32(10):2617-2634.
  17. GanXu-sheng, Duanmu JS, Wang JF, Cong Wei, “Anomaly intrusion detection based on PLS feature extraction and core vector machine,” Knowledge-based Systems 40 (2013)1-6.
  18. The KDD Cup 99 dataset is available at http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html
Index Terms

Computer Science
Information Sciences

Keywords

Intrusion detection Artificial Intelligence Feature selection Preprocessing Partial least square Centroid-based classification