CFP last date
20 December 2024
Reseach Article

A Hybrid Data Mining based Intrusion Detection System for Wireless Local Area Networks

by M. Moorthy, S. Sathiyabama
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 49 - Number 10
Year of Publication: 2012
Authors: M. Moorthy, S. Sathiyabama
10.5120/7663-0774

M. Moorthy, S. Sathiyabama . A Hybrid Data Mining based Intrusion Detection System for Wireless Local Area Networks. International Journal of Computer Applications. 49, 10 ( July 2012), 19-28. DOI=10.5120/7663-0774

@article{ 10.5120/7663-0774,
author = { M. Moorthy, S. Sathiyabama },
title = { A Hybrid Data Mining based Intrusion Detection System for Wireless Local Area Networks },
journal = { International Journal of Computer Applications },
issue_date = { July 2012 },
volume = { 49 },
number = { 10 },
month = { July },
year = { 2012 },
issn = { 0975-8887 },
pages = { 19-28 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume49/number10/7663-0774/ },
doi = { 10.5120/7663-0774 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:45:55.767783+05:30
%A M. Moorthy
%A S. Sathiyabama
%T A Hybrid Data Mining based Intrusion Detection System for Wireless Local Area Networks
%J International Journal of Computer Applications
%@ 0975-8887
%V 49
%N 10
%P 19-28
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The exponential growth in wireless network faults, vulnerabilities, and attacks make the WLAN security management a challenging research area [29]. Data mining applied to intrusion detection is an active area of research. The main reason for using data mining techniques for intrusion detection systems is due to the enormous volume of existing and newly appearing network data that require processing. Data mining follows anomaly based intrusion detection. The drawback of the anomaly based intrusion detection in a wireless network is the high rate of false positive. This can be solved by a designing a hybrid intrusion detection system by connecting a misuse detection module to the anomaly detection module. In this paper, we propose to develop a hybrid intrusion detection system for wireless local area networks, based on Fuzzy logic. In this Hybrid Intrusion Detection system, anomaly detection is performed using the Bayesian network technique and misuse detection is performed using the Support Vector Machine (SVM) technique. The overall decision of system is performed by the fuzzy logic. For anomaly detection using Bayesian network, each node has a monitoring agent and a classifier within it for its detection and a mobile agent for information collection. The anomaly is measured based on the naïve Bayesian technique. For misuse detection using SVM, all the data that lie within the hyper plane are considered to be normal whereas the data that lie outside the hyper plane are considered to be intrusive. The outputs of both anomaly detection and misuse detection modules are applied by the fuzzy decision rules to perform the final decision making. Hybrid detection system improves the detection performance by combining the advantages of the misuse and anomaly detection [33].

References
  1. http://en. wikipedia. org/wiki/Wireless_LAN
  2. Neveen I. Ghali, "Feature Selection for Effective Anomaly-Based Intrusion Detection", IJCSNS International Journal of Computer Science and Network Security, VOL. 9 No. 3, March 2009.
  3. Jatinder Singh, Dr. Lakhwinder Kaur and Dr. Savita Gupta, "Analysis of Intrusion Detection Tools for Wireless Local Area Networks" , IJCSNS International Journal of Computer Science and Network S 168 ecurity, Vol. 9 No. 7, July 2009.
  4. http://www. windowsecurity. com/articles/ What_You_Need_to_Know_About_Intrusion_Detection_Systems. html
  5. http://www. networkintrusion. co. uk/index. php/products/ids-and-ips/wireless-ids. html
  6. Shu Yun Lim and Andy Jones, "An Anomaly-based Intrusion Detection Architecture to Secure Wireless Networks".
  7. Qinglei Zhang and Wenying Feng, "Network Intrusion Detection by Support Vectors and Ant Colony" , ISBN 978-952-5726-06-0, Proceedings of the 2009 International Workshop on Information Security and Application (IWISA 2009), Qingdao, China, November 21-22, 2009.
  8. Mrutyunjaya Panda and Manas Ranjan Patra, "A Novel Classification via Clustering Method for Anomaly Based Network Intrusion Detection System", International Journal of Recent Trends in Engineering, Vol 2, No. 1, November 2009.
  9. K. Q. Yan, S. C. Wang, C. W. Liu, "A Hybrid Intrusion Detection System of Cluster-based Wireless Sensor Networks" , Proceedings of the International MultiConference of Engineers and Computer Scientists 2009 Vol I, IMECS 2009, March 18 - 20, 2009, Hong Kong.
  10. M. Mehdi, S. Zair, A. Anou and M. Bensebti, "A Bayesian Networks in Intrusion Detection Systems", Journal of Computer Science 3 (5): 259-265, 2007, ISSN 1549-3636, © 2007 Science Publications.
  11. R. Nakkeeran, T. Aruldoss Albert and R. Ezumalai, "Agent Based Efficient Anomaly Intrusion Detection System in Adhoc networks", IACSIT International Journal of Engineering and Technology Vol. 2, No. 1, February, 2010 ISSN: 1793-8236.
  12. Dewan Md. Farid, Nouria Harbi, and Mohammad Zahidur Rahman, "Combining Naive Bayes And Decision Tree For Adaptive Intrusion Detection" , International Journal of Network Security & Its Applications (IJNSA), Volume 2, Number 2, April 2010.
  13. Rung-Ching Chen and Su-Ping Chen, "Intrusion Detection Using A Hybrid Support Vector Machine Based On Entropy And Tf-Idf", International Journal of Innovative Computing, Information and Control, Volume 4, Number 2, February 2008, ICIC International °c 2008 ISSN 1349-4198.
  14. Harley Kozushko, "Intrusion Detection: Host-Based and Network-Based Intrusion Detection Systems", September 11, 2003 Independent Study
  15. Snehal A. Mulay, P. R. Devale and G. V. Garje, "Intrusion Detection System Using Support Vector Machine and Decision Tree" , International Journal of Computer Applications (0975 – 8887) Volume 3 – No. 3, June 2010.
  16. Rung-Ching Chen, Kai-Fan Cheng and Chia-Fen Hsieh, "Using Rough Set and Support Vector Machine for Network Intrusion Detection", International Journal of Network Security & Its Applications (IJNSA), Vol 1, No 1, April 2009.
  17. Susan M. Bridges and Rayford B. Vaughn, "Intrusion Detection Via Fuzzy Data Mining", Accepted for Presentation at The Twelfth Annual Canadian Information Technology Security Symposium June 19-23, 2000, The Ottawa Congress Centre.
  18. http://www. wolfram. com/products/applications /fuzzylogic/examples/job. html
  19. http://www. cse. msstate. edu/~bridges/ai/ Lecture12/sld034. htm
  20. Network Simulator, http://www. isi. edu/nsnam/ns
  21. Jaydip Sen "An Agent-Based Intrusion Detection System for Local Area Networks. " in International Journal of Communication Networks and Information Security (IJCNIS) Vol. 2, No. 2, 2010
  22. Guanlin Chen, Hui Yao, Zebing Wang "An Intelligent WLAN Intrusion Prevention System Based on Signature Detection and Plan Recognition", 2010 Second International Conference on Future Networks, pp. 168-172, 2010.
  23. Yujia Zhang, Guanlin Chen, Wenyong weng, Zebing Wang " An Overview of Wireless Intrusion Prevention Systems", 2010 Second International Conference on Communication System, Network and Applications, pp. 147-150, ICCSNA, 2010.
  24. Torres. L. M at el. ,"An anomaly-based intrusion detection system for IEEE 802. 11 networks", 2010, pages: 1-6
  25. Amudha. P et al. , "Performance Analysis of Data Mining Approaches in Intrusion Detection", PACC, (2011), page: 1-6
  26. P. Srinivasu et al. , "Implementation of Fuzzy C-Means and Dempster-Shafer Theory for Anomaly Intrusion Detection", IJCSNS (2011), Vol. 11 No. 9 pp. 39-46
  27. S. Tamilarasan, Aramudan," A Performance and Analysis of Misbehaving node in MANET using Intrusion Detection System", IJCSNS (2011), Vol. 11 No. 5 pp. 258-264
  28. R. Sommer, V. Paxson, "Outside the Closed World: On Using Machine Learning For Network Intrusion Detection," in Proc. of IEEE Symp. On Security and Privacy, Oakland, California, pp. 305-316, 2010
  29. Haddadi. F, Sarram M. A, 'Wireless intrusion detection system using lightweight agent', ICCNT (2010), pp. 84-87
  30. Kok Chin Khor et al. ,"Comparing Single and Multiple Bayesian Classifiers Approaches for Network Intrusion Detection", ICCEA (2010), pages: 325-329
  31. Guan Xiao Qing et al. , "Network intrusion detection method based on Agent and SVM", ICIME (2010), china, pp. 399-402.
  32. Yu-Xin Meng et al. , "The practice on using machine learning for network anomaly intrusion detection", ICMLC (2011), Volume-2, pp. 576-581
  33. Jiong Zhang et al. , "Random-Forests-Based Network Intrusion Detection Systems ", IEEE SMC (2008) 38(5), pp. 649-659
  34. Chetan. R et al. , "Data mining based network intrusion detection system: A database centric approach", ICCCI (2012), pp. 1-6
  35. Noreen Kausar et al. , "Communications in Computer and Information Science", 253(1) pp. 24-34
  36. Reyadh Shaker Naoum et al. , "An Enhanced Resilient Back propagation Artificial Neural Network for Intrusion Detection System", IJCSNS (2012), Vol. 12 No. 3, pp. 11-16
  37. Jing zhong et al. , "Intrusion detection using evolving fuzzy classifiers", ITAIC (2011), pp. 119-122
  38. L. A. Zadeh, "Fuzzy Sets," in Information and Control, vol. 8, pp. 338- 353, 1965.
  39. Abadeh, M. S. , Habibi, J. , Lucas, C. ," Intrusion detection using a fuzzy genetics-based learning algorithm", IJNA (2007), Volume 30, Issue 1, January 2007, Pages 414-428
  40. Abraham, A. , Jain, R. , Thomas, J. , Han, S. Y. ," D-SCIDS: Distributed soft computing intrusion detection system", IJNA (2007), Volume 30, Issue 1, January 2007, Pages: 81-98
  41. Peddabachigari, S. , Abraham, A. , Grosan, C. , Thomas, J. ," Modeling intrusion detection system using hybrid intelligent systems", IJNA (2007), Volume 30, Issue 1, January 2007, Pages 114-132
  42. Miao Xie, Song Han, Biming Tian, Sazia Parvin, "Anomaly detection in wireless sensor networks: A survey", IJNA (2011), Volume 34, Issue 4, July 2011, Pages 1302–1325
  43. Hoang, X. D. , Hu, J. , Bertok, P. ," A program-based anomaly intrusion detection scheme using multiple detection engines and fuzzy inference", IJNA (2009), Volume 32, Issue 6, November 2009, Pages 1219-1228
Index Terms

Computer Science
Information Sciences

Keywords

Intrusion Detection system (IDS) Wireless Local Area Network (WLAN) Support Vector Machine (SVM) Bayesian network Monitoring agent