CFP last date
20 December 2024
Reseach Article

Intrusion Detection System using Wrapper Approach

Published on May 2013 by Ajit A Muzumdar, Sandip A. Shivarkar, Prakash N Kalavadekar
International Conference on Recent Trends in Engineering and Technology 2013
Foundation of Computer Science USA
ICRTET - Number 2
May 2013
Authors: Ajit A Muzumdar, Sandip A. Shivarkar, Prakash N Kalavadekar
b2a8ce5a-443c-42cd-9caa-fa56562d101c

Ajit A Muzumdar, Sandip A. Shivarkar, Prakash N Kalavadekar . Intrusion Detection System using Wrapper Approach. International Conference on Recent Trends in Engineering and Technology 2013. ICRTET, 2 (May 2013), 24-28.

@article{
author = { Ajit A Muzumdar, Sandip A. Shivarkar, Prakash N Kalavadekar },
title = { Intrusion Detection System using Wrapper Approach },
journal = { International Conference on Recent Trends in Engineering and Technology 2013 },
issue_date = { May 2013 },
volume = { ICRTET },
number = { 2 },
month = { May },
year = { 2013 },
issn = 0975-8887,
pages = { 24-28 },
numpages = 5,
url = { /proceedings/icrtet/number2/11771-1323/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 International Conference on Recent Trends in Engineering and Technology 2013
%A Ajit A Muzumdar
%A Sandip A. Shivarkar
%A Prakash N Kalavadekar
%T Intrusion Detection System using Wrapper Approach
%J International Conference on Recent Trends in Engineering and Technology 2013
%@ 0975-8887
%V ICRTET
%N 2
%P 24-28
%D 2013
%I International Journal of Computer Applications
Abstract

Intrusion detection is the process of monitoring and analyzing the events occurring in a computer system in order to detect signs of security problems. Today most of the intrusion detection approaches focused on the issues of feature selection or reduction, since some of the features are irrelevant and redundant which results lengthy detection process and degrades the performance of an intrusion detection system (IDS). The objective of this paper is to construct a lightweight Intrusion Detection System (IDS) aimed at detecting anomalies in networks. The crucial part of building lightweight IDS depends on preprocessing of network data, identifying important features and in the design of efficient learning algorithm that classify normal and anomalous patterns. The design of IDS is investigated from these three perspectives. The goals are to remove redundant instances that causes the learning algorithm to be unbiased, identify suitable subset of features by employing a wrapper based feature selection algorithm and realizing proposed IDS with neurotree to achieve better detection accuracy.

References
  1. Siva S. Sivatha Sindhu , S. Geetha , A. Kannan" Decision tree based light weight intrusion detection using a wrapper approach", Expert Systems with Applications 39 (2012) 129–141.
  2. Kapil Kumar Gupta, Baikunth Nath, Ramamohanarao Kotagiri," Layered Approach Using Conditional Random Fields for Intrusion Detection" IEEE Transactions On Dependable And Secure Computing, Vol. 7, No. 1, January- March 2010.
  3. Mehdi MORADI and Mohammad ZULKERNINE," A Neural Network Based System for Intrusion Detection and Classification of Attacks", Natural Sciences and Engineering Research Council of Canada (NSERC).
  4. Bertrand Portier ,Froment-Curtil," Data Mining Techniques for Intrusion Detection", The University of Texas at Austin, Spring 2000 Dr. Ghosh – EE380L Data Mining Term Paper.
  5. L Prema RAJESWARI, Kannan ARPUTHARAJ," An Active Rule Approach for Network Intrusion Detection with Enhanced C4. 5 Algorithm", I. J. Communications, Network and System Sciences, 2008, 4, 284-359Published Online November 2008 in SciRes . (http://www. SRPublishing. org/ journal/ijcns/)
  6. Ahmed H. Fares* and Mohamed I. Sharawy ," Intrusion Detection: Supervised Machine Learning", Journal of Computing Science and Engineering, Vol. 5, No. 4, December 2011.
  7. Nahla Ben Amor, Salem Benferhat," Naive Bayes vs Decision Trees in Intrusion Detection Systems" , SAC'04, March 14-17, 2004, Nicosia, Cyprus.
  8. Dr. Saurabh Mukherjeea, Neelam Sharma," Intrusion Detection using Naive Bayes Classifier with Feature Reduction", Procedia Technology 4 ( 2012 ) 119 – 128.
  9. Tom V. Mathew," Genetic Algorithm", Indian Institute of Technology Bombay, Mumbai-400076.
  10. Simon Haykin,"Feed Forward Neural networks:an introduction"
  11. Richard Power. 1999 CSI/FBI computer crime and security survey. Computer Security Journal,Volume XV (2), 1999
  12. SANS Institute—Intrusion Detection FAQ, http://www. sans. org/resources/idfaq/, 2010.
  13. Overview of Attack Trends, http://www. cert. org/archive/pdf/attack_trends. pdf, 2002.
  14. K. K. Gupta, B. Nath, R. Kotagiri, and A. Kazi, "Attacking Confidentiality: An Agent Based Approach," Proc. IEEE Int'l Conf. Intelligence and Security Informatics (ISI'06), vol. 3975, pp. 285-296, 2006.
Index Terms

Computer Science
Information Sciences

Keywords

Sensitivity Specificity Error Rate