CFP last date
20 January 2025
Reseach Article

Intrusion Detection using Associative Rule and Support Vector Machine

by Fadekemi A. Adetoye
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 174 - Number 17
Year of Publication: 2021
Authors: Fadekemi A. Adetoye
10.5120/ijca2021920991

Fadekemi A. Adetoye . Intrusion Detection using Associative Rule and Support Vector Machine. International Journal of Computer Applications. 174, 17 ( Feb 2021), 12-18. DOI=10.5120/ijca2021920991

@article{ 10.5120/ijca2021920991,
author = { Fadekemi A. Adetoye },
title = { Intrusion Detection using Associative Rule and Support Vector Machine },
journal = { International Journal of Computer Applications },
issue_date = { Feb 2021 },
volume = { 174 },
number = { 17 },
month = { Feb },
year = { 2021 },
issn = { 0975-8887 },
pages = { 12-18 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume174/number17/31768-2021920991/ },
doi = { 10.5120/ijca2021920991 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:22:22.052716+05:30
%A Fadekemi A. Adetoye
%T Intrusion Detection using Associative Rule and Support Vector Machine
%J International Journal of Computer Applications
%@ 0975-8887
%V 174
%N 17
%P 12-18
%D 2021
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In this contemporary technology-motivated era, shielding our private information from being accessed by unauthorized users is becoming more intricate, vastly confidential information are becoming more accessible by public databases, because we are more interconnected than ever. Thus, our information is available for almost anyone to filter due to this interconnectivity, and this creates a pessimistic mindset that the use of technology is hazardous, unpredictable and highly unprotective because virtually anyone can access one’s private information for an outlay. The weaknesses discovered from the previous work are the key motivation for this research work. These includes: The work done on Network Intrusion Detection using Association Rules which generated an incomprehensive set of attack rules due to the small percentage of KDD’99 data set used for training set, proposed wrapper method for feature selection in multiple class data set using a sequential backward elimination method which is more computationally expensive and time consuming, and Development of a Denial of Service attack detection using machine learning technique in which the Significant features of data set were not extracted, and the extraction was done using only one extraction technique which results in high level of FAR (False Alarm Rate) due to poor detection of attacks. This research makes use of NSL-KDD and UNSW-NB15 data set, with filter and wrapper method as the feature selection techniques. In addition, an intrusion detection model was developed based association rule and support vector machine and performance of the model was evaluated.

References
  1. J. Jang-Jaccard, S. Nepal 2014 A survey of emerging threats in cybersecurity, J. Comput. Syst. Sci. 80 (5) (2014) 973–993, doi: 10.1016/j.jcss.2014.02.005
  2. Colesky, M., J.-H. Hoepman, and C. Hillen, 2016 “A critical analysis of privacy design strategies”, IEEE Security and Privacy Workshops (SPW), first online O4 August 2016, doi:10.1109/SPW.2016.23
  3. Cybercrime 2012 Cyber Crime & Security survey. Commonwealth of Australia, http://realbusiness.co.uk.
  4. Hung-Jen Liao, Chun-Hung Richard Lin, Ying-Chih Lin, Kuang-Yuan Tung. 2013. Intrusion detection system: A comprehensive review. Journals of network and computer Applications, Vol. 36, pp. 16-24.
  5. Peddabachigari, S., Abraham, A., Grosan, C., and Thomas, J. 2007 Modelling Intrusion Detection System Using Hybrid Systems. J. Network Computer. Application, 30(2), 114–132.
  6. Aladesote O. I., Boniface K. A., and Folasade D. 2014 Intrusion Detection Technique using Hypothesis Testing. Proceedings of the World Congress on Engineering and Computer Science, 1(2), 978-988.
  7. Bowker, Art 2012 The Cybercrime Handbook for Community Corrections: Managing Risk in the 21st Century. Springfield: Thomas. ISBN 9780398087289. Archived from the original on 2 April 2015. Retrieved 25 January 2015.
  8. O. Pathan, A. Sakib 2014 The state of the art in intrusion prevention and detection, pp. 335–360.
  9. Bace, R. and Mell, P. 2001 Intrusion Detection Systems, National Institute of Standards and Technology (NIST), TechnicalReport,bhttp://www.nist.gov/manuscript.publication.search.cfm? pub.
  10. O.O. Olasehinde, B.K. Alese, A.O. Adetunmbi, 2018 Performance evaluation of bayesian classifier on filter-based feature selection techniques, Int. J. Comput. Sci. Telecommun. 9 (7) 24–30.
  11. Tsai, F. S. and Chan, K. L. 2009 Blog Data Mining for Cyber Security Threats, in: Data Mining for Business Applications, 169–182.
  12. Marano N.S., Betanzos A.A., Estevez R.M. 2009, A Wrapper Method for Feature Selection in Multiple Classes Data sets. IWANN '09 Proceedings of the 10th International Work-Conference on Artificial Neural Networks: Part I: Bio-Inspired Systems: Computational and Ambient Intelligence. Pp 456-463.
  13. Fatogun, B. A. 2012 Denial of Service Attack Detection Using Machine Learning Techniques, A Thesis in the Department of Computer Science, Federal University of Technology, Akure, Nigeria, pp 2-4.
  14. Devikrishna K S, and Ramakrishna B. B. 2014 An analysis of Intrusion Detection System using Back Propagation Neural Network. International Journal of Engineering Research and Applications (IJERA), 3(4), 1959-1964.
  15. Liu, H. Y., Xiangdong C., and Shalini L. 2017, Understanding Modern Intrusion Detection Systems: A Survey. College of Technology, Eastern Michigan University, United States 2(1), 1-9
  16. Nour, M. and Jill, S. 2015 A Hybrid Feature Selection for Network Intrusion Detection Systems: Central points. The Proceedings of the 16th Australian Information Warfare Conference, pp. 5-13.
  17. S.Q. Qais, J.A. Mohd, M.Z. Abdullah 2016 Anomalies classification approach for network-based intrusion detection system, Int. J. Netw. Secur. 18 (6) 1159–1172.
  18. Youn, E. and Jeong, M. K. 2009 Class Dependent Feature Scaling Method using Naive Bayes Classifier for text data mining. Pattern Recognition Letters. 30 (5), 477–485.
  19. R. Agrawal, T. Imielinski, A. Swami 2013 Mining association rules between sets of items in large databases, In proceedings of ACM SIGMOD conference 207–216.
  20. A. Cuzzocrea, C.K. Leung, R.K. MacKinnon 2015 Approximation to expected support of frequent itemset in mining probabilistic sets of uncertain data, Procedia Comput. Sci. 613–622.
  21. K. Lai, N. Cerpa, Support vs Confidence in Association Rule Algorithms, in: Conference of the Chilean Operations Research Society, 2001, pp. 1–15.
  22. C.K. Leung 2015 Big data mining applications and services, In Big data application and services BigDAS 1–8.
Index Terms

Computer Science
Information Sciences

Keywords

Intrusion detection Machine learning security Data analysis Data Science.