CFP last date
20 December 2024
Reseach Article

Intrusion Detection System with Multi Layer using Bayesian Networks

by Jasreena Kaur Bains, Kiran Kumar Kaki, Kapil Sharma
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 67 - Number 5
Year of Publication: 2013
Authors: Jasreena Kaur Bains, Kiran Kumar Kaki, Kapil Sharma
10.5120/11388-6680

Jasreena Kaur Bains, Kiran Kumar Kaki, Kapil Sharma . Intrusion Detection System with Multi Layer using Bayesian Networks. International Journal of Computer Applications. 67, 5 ( April 2013), 1-4. DOI=10.5120/11388-6680

@article{ 10.5120/11388-6680,
author = { Jasreena Kaur Bains, Kiran Kumar Kaki, Kapil Sharma },
title = { Intrusion Detection System with Multi Layer using Bayesian Networks },
journal = { International Journal of Computer Applications },
issue_date = { April 2013 },
volume = { 67 },
number = { 5 },
month = { April },
year = { 2013 },
issn = { 0975-8887 },
pages = { 1-4 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume67/number5/11388-6680/ },
doi = { 10.5120/11388-6680 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:23:50.072831+05:30
%A Jasreena Kaur Bains
%A Kiran Kumar Kaki
%A Kapil Sharma
%T Intrusion Detection System with Multi Layer using Bayesian Networks
%J International Journal of Computer Applications
%@ 0975-8887
%V 67
%N 5
%P 1-4
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In the era of network security, intrusion detection system plays a vital to detect real – time intrusions, and to execute work to stop the attack. Being everything shifting to internet, security became the foremost preference. In real world, the minority attacks R2L (Remote-To-User) and U2R (User-To-Root) are more hazardous than Probe and DoS (Denial-Of-Service) majority attacks. Present IDS are not much efficient to detect these low level attacks. Therefore, it is extremely important to improve the detection performance for the R2L and U2R attacks with the majority attacks. In this paper hierarchical layered approach for improving detection rate of minority attacks as well as majority attacks is propound. The propound model used Naive bayes classifier with K2 learning process on reduced NSL KDD dataset for each attack class. In this method every layer is individually trained to detect a single type of attack category and the outcome of one layer is passed into another layer to increase the detection rate and for better categorization of both the majority and minority attacks.

References
  1. T. Subbulakshmi, S. Mercy Shalinie, A. Ramamoorthi Detection and Classification of DDoS Attacks Using Machine Learning Algorithms, European Journal of Scientific Research ISSN 1450-216X Vol. 47 No. 3 (2010), pp. 334-346
  2. Reyhaneh Karimazad , Ahmad Faraahi, An Anomaly-Based Method for DDoS Attacks Detection using RBF Neural Networks, International Conference on Network and Electronics Engineering IPCSIT vol. 11 (2011) IACSIT Press, Singapore
  3. Subbulakshmi, T. Shalinie, S. M. GanapathiSubramanian, V. Balakrishnan, K. Anand Kumar. Kannathal, K. Detection of dDoS attacks using Enhanced Support Vector Machines with real time generated dataset, Advanced Computing (ICoAC), 2011 Third International Conference
  4. Saman M. Abdulla, Najla B. Al-Dabagh, Omar Zakaria, Identify Features and Parameters to Devise an Accurate Intrusion Detection System Using Artificial Neural Network, World Academy of Science, Engineering and Technology 2010.
  5. I Ahmad, A B Abdulah, A S Alghamdi, K Alnfajan, MHussain, Feature Subset Selection for Network intrusion Detection Mechanism Using Genetic Eigen Vectors, Proc . of CSIT vol. 5 (2011)
  6. H Nguyen, K Franke, S Petrovic Improving Effectiveness of Intrusion Detection by Correlation Feature Selection, 2010 International Conference on Availability, Reliability and Security,IEEE Pages-17-24 .
  7. S. Axelsson, "The base rate fallacy and its implications for the difficulty of Intrusion detection", Proc. Of 6th. ACM conference on computer and communication security 1999.
  8. Kapil Kumar Gupta, BaikunthNath and Ramamohanarookotagiri, "A layered approach using conditional random fields for intrusion detection", IEEE Tranc. on Dependence and secure computing, Vol. 7, 2010
  9. Nahla Ben Amor, Salem Benferhat, ZiedElouedi "Naive Bayes vs Decision Trees in Intrusion Detection Systems" AC'04, March 14-17, 2004,
  10. Neelam Sharma, Saurabh Mukherjee, Layered Approach for Intrusion Detection Using Naive Bayes Classifier, International Conference on Advances in Computing, Communications and Informatics (ICACCI-2012), August 3-5, 2012, Chennai, T Nadu, India.
Index Terms

Computer Science
Information Sciences

Keywords

Intrusion detection system (IDS) Network security Feature selection naive bayes classifier R2U U2R DoS