We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 November 2024
Call for Paper
December Edition
IJCA solicits high quality original research papers for the upcoming December edition of the journal. The last date of research paper submission is 20 November 2024

Submit your paper
Know more
Reseach Article

Adaptive Layered Approach using Machine Learning Techniques with Gain Ratio for Intrusion Detection Systems

by Heba Ezzat Ibrahim, Sherif M. Badr, Mohamed A. Shaheen
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 56 - Number 7
Year of Publication: 2012
Authors: Heba Ezzat Ibrahim, Sherif M. Badr, Mohamed A. Shaheen
10.5120/8901-2928

Heba Ezzat Ibrahim, Sherif M. Badr, Mohamed A. Shaheen . Adaptive Layered Approach using Machine Learning Techniques with Gain Ratio for Intrusion Detection Systems. International Journal of Computer Applications. 56, 7 ( October 2012), 10-16. DOI=10.5120/8901-2928

@article{ 10.5120/8901-2928,
author = { Heba Ezzat Ibrahim, Sherif M. Badr, Mohamed A. Shaheen },
title = { Adaptive Layered Approach using Machine Learning Techniques with Gain Ratio for Intrusion Detection Systems },
journal = { International Journal of Computer Applications },
issue_date = { October 2012 },
volume = { 56 },
number = { 7 },
month = { October },
year = { 2012 },
issn = { 0975-8887 },
pages = { 10-16 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume56/number7/8901-2928/ },
doi = { 10.5120/8901-2928 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:59:16.056022+05:30
%A Heba Ezzat Ibrahim
%A Sherif M. Badr
%A Mohamed A. Shaheen
%T Adaptive Layered Approach using Machine Learning Techniques with Gain Ratio for Intrusion Detection Systems
%J International Journal of Computer Applications
%@ 0975-8887
%V 56
%N 7
%P 10-16
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Intrusion Detection System (IDS) has increasingly become a crucial issue for computer and network systems. Optimizing performance of IDS becomes an important open problem which receives more and more attention from the research community. In this work, A multi-layer intrusion detection model is designed and developed to achieve high efficiency and improve the detection and classification rate accuracy . we effectively apply Machine learning techniques (C5 decision tree, Multilayer Perceptron neural network and Naïve Bayes) using gain ratio for selecting the best features for each layer as to use smaller storage space and get higher Intrusion detection performance. Our experimental results showed that the proposed multi-layer model using C5 decision tree achieves higher classification rate accuracy, using feature selection by Gain Ratio, and less false alarm rate than MLP and naïve Bayes. Using Gain Ratio enhances the accuracy of U2R and R2L for the three machine learning techniques (C5, MLP and Naïve Bayes) significantly. MLP has high classification rate when using the whole 41 features in Dos and Probe layers.

References
  1. R. A. Kemmerer and G. Vigna, "Intrusion detection: a brief history and overview," Computer, vol. 35, no. 4, pp. 27–30,2002.
  2. Ali, A, Saleh, A & Badawy, T. (2010). Intelligent Adaptive Intrusion Detection Systems Using Neural Networks (Comparative study). International Journal of Video & Image Processing and Network Security IJVIPNS-IJENS,10 (01). Retrieved October 25, 2011, from http://www. ijens. org/101701-6363%20IJVIPNS-IJENS. pdf.
  3. Kayacik H. G. , Zincir-Heywood A. N. , Heywood M. I. , "Selecting Features for Intrusion Detection: A Feature Relevance Analysis on KDD 99 Intrusion Detection Datasets", Proceedings of the Third Annual Conference on Privacy, Security and Trust (PST-2005), October 2005.
  4. M. Moradi, and M. Zulkernine, "A Neural Network Based System for Intrusion Detection and Classification of Attacks, " IEEE International Conference on Advances in Intelligent Systems – Theory and Applications, Luxembourg- Kirchberg, Luxembourg, November 15-18, 2004.
  5. Xu Kefu, Guo Li, Tan Jianlong, Liu Ping,"Traffic aware frequent element matching algorithm for Deep Packet Inspetion",International Conference on Network Security,wireless communication & Trusted Computing, 2010.
  6. J. P. Anderson, "Computer security threat monitoring and surveillance",Technical Report, James P. Anderson Co. , Fort Washington, PA, April 1980.
  7. W. Stallings, "Cryptography and network security principles and practices", USA Prentice Hall, 2006.
  8. C. Tsai , Y. Hsu, C. Lin and W. Lin, "Intrusion detection by machine learning: A review", Expert Systems with Applications, vol. 36, pp. 11994-12000, 2009.
  9. S. Wu and W. Banzhaf, "The use of computational intelligence in intrusion detection systems: A review", Applied Soft Computing, vol. 10, pp. 1-35, 2010.
  10. S. Mukkamala, G. Janoski and A. Sung, "Intrusion detection: support vector machine and neural networks" In proceedings of the IEEE International Joint Conference on Neural Networks (ANNIE), St. Louis, MO, pp. 1702-1707, 2002.
  11. J. Cannady, "Artificial neural networks for misuse detection, Proceedings of the 1998 National Information Systems Security Conference (NISSC'98), Arlington, VA, pp. 443-456, 1998.
  12. Srinivas Mukkamala, "Intrusion detection using neural networks and support vector machine, " Proceedings of the 2002 IEEE International Honolulu, HI, 2002.
  13. Dewan Md. Farid, Nouria Harbi, Emna Bahri, Mohammad Zahidur Rahman and Chowdhury Mofizur Rahman, "Attacks Classification in Adaptive Intrusion Detection using Decision Tree, " International Conference on Computer Science (ICCS 2010), 29-31 March, 2010, Rio De Janeiro, Brazil.
  14. L Prema RAJESWARI and Kannan ARPUTHARAJ, "An Active Rule Approach for Network Intrusion Detection with Enhanced C4. 5 Algorithm, " International Journal of Communications, Network and Systems Sciences (IJCNS), 2008, 4, 285-385.
  15. H. Debar, M. Becke, and D. Siboni, "A Neural Network Component for an Intrusion Detection System," Proc. IEEE Symp. Research in Security and Privacy (RSP '92), pp. 240-250, 1992.
  16. Z. Zhang, J. Li, C. N. Manikopoulos, J. Jorgenson, and J. Ucles, "HIDE: A Hierarchical Network Intrusion Detection System Using Statistical Preprocessing and Neural Network Classification,"Proc. IEEE Workshop Information Assurance and Security (IAW '01), pp. 85-90, 2001.
  17. K. K. Gupta, B. Nath, and R. Kotagiri, "Network Security Framework,"Int'l J. Computer Science and Network Security, vol. 6, no. 7B,pp. 151-157, 2006.
  18. Rupali S. Shishupal , T. J. Parvat, " Layered Framework for Building Intrusion Detection Systems, " International Journal of Advances in Computing and Information Researches ISSN:2277-4068, Volume 1– No. 2, April 2012
  19. Kapil Kumar Gupta, Baikunth Nath, and Ramamohanarao Kotagiri "Layered Approach Using Conditional Random Fields for Intrusion Detection" IEEE Transactions on dependable and secure Computing, vol. 5, no. 4, october-december 2008.
  20. N. B. Amor, S. Benferhat, and Z. Elouedi, "Naïve Bayes vs. Decision Trees in Intrusion Detection Systems," Proc. ACM Symp. Applied Computing (SAC '04), pp. 420-424, 2004.
  21. Quinlan JR. "C4. 5: programs for machine learning," Log Altos,CA: Morgan Kaufmann; 1993.
  22. SPSS. Clementine 12. 0 modeling nodes. Chicago: SPSS; 2007 .
  23. Sahar Selim, Mohamed Hashem and Taymoor M. Nazmy, "Hybrid Multi-level Intrusion Detection System , " International Journal of Computer Science and Information Security (IJCSIS), pp. 23-29, Vol. 9, No. 5, May 2011
  24. Zubair A. Baig, Abdulrhman S. Shaheen, and Radwan AbdelAal, "One-Dependence Estimators for Accurate Detection of Anomalous Network Traffic," International Journal for Information Security Research (IJISR), Volume 1, Issue 4, December 2011,
  25. M. Tavallaee, E. Bagheri, W. Lu, and A. Ghorbani, "A Detailed Analysis of the KDD CUP 99 Data Set," Submitted to Second IEEE Symposium on Computational Intelligence for Security and Defense Applications (CISDA), 2009.
  26. "NSL-KDD data set for network-based intrusion detection systems ", Available on: http://nsl. cs. unb. ca/NSL-KDD/, March 2009.
  27. Heba Ezzat Ibrahim, Sherif M. Badr and Mohamed A. Shaheen," Phases vs. Levels using Decision Trees for Intrusion Detection Systems ," International Journal of Computer Science and Information Security, Vol. 10, No. 8, 2012
Index Terms

Computer Science
Information Sciences

Keywords

Intrusion Detection Layered Approach Machine Learning NSL-KDD dataset Network Security