CFP last date
20 December 2024
Reseach Article

Improving the Intrusion Detection using Discriminative Machine Learning Approach and Improve the Time Complexity by Data Mining Feature Selection Methods

by Karan Bajaj, Amit Arora
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 76 - Number 1
Year of Publication: 2013
Authors: Karan Bajaj, Amit Arora
10.5120/13209-0587

Karan Bajaj, Amit Arora . Improving the Intrusion Detection using Discriminative Machine Learning Approach and Improve the Time Complexity by Data Mining Feature Selection Methods. International Journal of Computer Applications. 76, 1 ( August 2013), 5-11. DOI=10.5120/13209-0587

@article{ 10.5120/13209-0587,
author = { Karan Bajaj, Amit Arora },
title = { Improving the Intrusion Detection using Discriminative Machine Learning Approach and Improve the Time Complexity by Data Mining Feature Selection Methods },
journal = { International Journal of Computer Applications },
issue_date = { August 2013 },
volume = { 76 },
number = { 1 },
month = { August },
year = { 2013 },
issn = { 0975-8887 },
pages = { 5-11 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume76/number1/13209-0587/ },
doi = { 10.5120/13209-0587 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:44:45.845177+05:30
%A Karan Bajaj
%A Amit Arora
%T Improving the Intrusion Detection using Discriminative Machine Learning Approach and Improve the Time Complexity by Data Mining Feature Selection Methods
%J International Journal of Computer Applications
%@ 0975-8887
%V 76
%N 1
%P 5-11
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

As the dependence of daily life is increasing on Internet technology, the attacks on the systems, servers are also rapidly increasing. The motives of attacks are to steal the confidential data from the systems or making the system unavailable to the authorised users. An effective approach is required to detect the intrusions to provide the defence to the Networks. First we applied the feature selection to reduce the dimensions of NSL-KDD data set. By feature reduction and machine learning approach we able to build Intrusion detection model to find attacks on system and improve the intrusion detection using the captured data. The intrusion detection accuracy of learning algorithms is also performed on the data set, without the level 21 attacks which is most easy to identify attacks, using learning algorithms and the success rate of proposed model is calculated over the attacks which are hard to detect.

References
  1. Chia-Mei Chen, Ya-Lin Chen, Hsiao-Chung Lin 2010. "An efficient network intrusion detection", Elsevier, vol. 33 (4), pp. 477- 484.
  2. "Nsl-kdd data set for network-based intrusion detection systems. Available on: http://nsl. cs. unb. ca/NSL-KDD/, March 2009.
  3. KDD Cup 1999. Available on: http://kdd. ics. uci. edu/databases/kddcup99/kddcup99. html
  4. Meera Gandhi G. , Kumaravel, A. , Srivatsa, S. K. , 2010. "Effective Network Intrusion Detection using Classifiers Decision Trees and Decision rules" Int. J. Advanced Networking and Applications, vol. 2 (3), pp. 686.
  5. Aarthy, R. and Marikkannu, P. , 2012. "Extended security for intrusion detection system using data cleaning in large database" International Journal of Communications and Engineering, vol. 2(2), pp. 56-60.
  6. Guy Helmer, Johnny, S. K. W. , Honvar, V. , Miller, Wang, Y. , 2010. "Lightweight agents for intrusion detection", Journal of systems and Software. Elsevier, vol 67(2), pp. 109-122.
  7. Sperotto, A. , Gregor Schaffrath, Sadre, R. , Morariu, C. , Aiko Pras, and Stiller, B. , 2010. "An Overview of IP Flow-Based Intrusion Detection" IEEE communications surveys & tutorials, vol. 12(3): pp. 343
  8. Mahbod Tavallaee, Ebrahim Bagheri, Wei Lu, and Ali, A. , Ghorbani, 2009 "A Detailed Analysis of the KDD CUP 99 Data Set" IEEE Symposium on computational intelligence in security and defence application.
  9. Jiawei Han and Micheline kamber: Data Mining Concepts and Techniques ,Publisher Elsevier, 2001, pp. 67-69,296-301.
  10. John, G. H. , Langley, P. , 1995 "Estimating Continuous Distributions in Bayesian Classifiers" In Proc. Of 11th Conference on Uncertainty in Artificial Intelligence.
  11. Huy Anh Nguyen and Deokjai Choi. , 2008 "Application of Data Mining to Network Intrusion Detection: Classifier Selection Model", Springer-Verlag Berlin Heidelberg, LNCS 5297, pp. 399–408.
  12. "Waikato environment for knowledge analysis (weka) version 3. 6. 9. and 3. 7. 9"Available on :http://www. cs. waikato. ac. nz/ml/weka/
  13. Quinlan, J. : C4. 5: 1993. Programs for Machine Learning, Publisher Morgan Kaufmann, San Mateo.
  14. Kohavi, R. , "Scaling up the accuracy of naive-bayes classifiers: A decision-tree hybrid," ser. Proceedings of the Second International Conference on Knowledge Discovery and Data Mining. AAAI Press, 1996, pp. 202–207.
  15. Liangxiao Jiang, and Chaoqun Li. , 2011. "Scaling Up the Accuracy of Decision-Tree Classifiers: A Naive-Bayes Combination," Journal of Computers, vol. 6 (4), pp. 1325-1331.
  16. Chih-Chung Chang and Chih-Jen Lin, "LIBSVM : a library for support vector machines," ACM Transactions on Intelligent Systems and Technology, 2:27:1--27:27, 2011. Software available at http://www. csie. ntu. edu. tw/~cjlin/libsvm
  17. Lior Rokach and Oded Maimon, "DECISION TREES," Department of Industrial Engineering, Tel-Aviv University, pp. 181
Index Terms

Computer Science
Information Sciences

Keywords

Feature Selection Weka NSL-KDD data set Accuracy Intrusion detection Machine learning