We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

Performance Analysis of Supervised Approach for Pattern Based IDs

Published on December 2011 by V. K. Pachghare, Vaibhav K Khatavkar, Parag Kulkarni
Network Security and Cryptography
Foundation of Computer Science USA
NSC - Number 4
December 2011
Authors: V. K. Pachghare, Vaibhav K Khatavkar, Parag Kulkarni
8cbf7fa8-1729-42d2-adcc-9222cff271cf

V. K. Pachghare, Vaibhav K Khatavkar, Parag Kulkarni . Performance Analysis of Supervised Approach for Pattern Based IDs. Network Security and Cryptography. NSC, 4 (December 2011), 20-23.

@article{
author = { V. K. Pachghare, Vaibhav K Khatavkar, Parag Kulkarni },
title = { Performance Analysis of Supervised Approach for Pattern Based IDs },
journal = { Network Security and Cryptography },
issue_date = { December 2011 },
volume = { NSC },
number = { 4 },
month = { December },
year = { 2011 },
issn = 0975-8887,
pages = { 20-23 },
numpages = 4,
url = { /specialissues/nsc/number4/4345-spe043t/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Special Issue Article
%1 Network Security and Cryptography
%A V. K. Pachghare
%A Vaibhav K Khatavkar
%A Parag Kulkarni
%T Performance Analysis of Supervised Approach for Pattern Based IDs
%J Network Security and Cryptography
%@ 0975-8887
%V NSC
%N 4
%P 20-23
%D 2011
%I International Journal of Computer Applications
Abstract

Aim of an intrusion detection system (IDS) is to distinguish the behavior of network. IDS should upgrade itself so as to cope up with the changing pattern of attacks. Also detection rate should be high since attack rate on the network is very high. In response to this problem, Pattern Based Algorithm is proposed which has high detection rate and low false alarm rate. The work is related to the development of pattern based IDS using supervised approach. The algorithm uses decision stumps as weak classifier. The decision rules are provided for both categorical and continuous features. Weak classifier for continuous features and weak classifier for categorical features are combined to form a strong classifier. The experimentation is performed on KDD CUP 99 dataset and NSL KDD data which is revised KDD CUP 99 data.

References
  1. Denning D, An Intrusion-Detection Model, IEEE Transactions on Software Engineering, Vol. SE- 13, No 2, Feb 1987.
  2. V K. Pachghare, Dr. Parag Kulkarni, and Deven Nikam, Overview of Intrusion Detection Systems, International Journal of Computer Science and Engineering Systems, Vol. 3, No. 3, 265-268, 2009.
  3. S. Mukkamala and A H. Sung, A comparative study of techniques for intrusion detection, in Proc. Int. Conf. Tools Artif. Intell., 2003, pp. 570-577
  4. V K Pachghare and Parag Kulkarni , Performance Analysis of Pattern Based Network Security, 2nd International Conference on Computer Technology and Development (ICCTD 2010) IEEE, pg 277 281
  5. Y.-H. Liu, D.-X. Tian, and A.-M. Wang, "Annids: Intrusion detection system based on articial neural network", in Proc. Int. Conf. Mach. Learn. Cybern., Nov. 2003, vol. 3, pp. 1337-1342.
  6. C. Zhang, J. Jiang, and M. Kamel, "Intrusion detection using hierarchical neural networks", Pattern Recognit. Lett., vol. 26, no. 6, pp. 779-791, May 2005.
  7. P. Hong and R. E. Schapire, "An intrusion detection method based on rough set and SVM algorithm", in Proc. Int. Conf. Commun., Circuits Syst., Jun. 2004, vol. 2, pp. 1127-1130.
  8. Z. Zhang and H. Shen, "Online training of SVMs for real-time intrusion detection", in Proc. Int. Conf. Adv. Inf. Netw. Appl., 2004, vol. 1, pp. 568-573.
  9. J. M. Bonifacio, Jr., A. M. Cansian, A. C. P. L. F. De Carvalho, and E. S. Moreira, Neural networks applied in intrusion detection systems, in Proc. IEEE Int. Joint Conf. Neural Netw., 1998, vol. 1, pp. 205-210.
  10. A. Rapaka, A. Novokhodko, and D. Wunsch, Intrusion detection using radial basis function network on sequences of system calls, in Proc. Int. Joint Conf. Neural Netw., 2003, vol. 3, pp. 1820-1825.
  11. S. J. Han and S. B. Cho, Evolutionary neural networks for anomaly detection based on the behavior of a program, IEEE Trans. Syst., Man, Cybern. B, Cybern., vol. 36, no. 3, pp. 559-570, Jun. 2006.
  12. S. Mukkamala, G. Janoski, and A. H. Sung, Intrusion detection using neural networks and support vector machines, in Proc. Int. Joint Conf. Neural Netw., 2002, vol. 2, pp. 1702-1707
  13. J. Mill and A. Inoue, Support vector classi_ers and network intrusion detection, in Proc. Int. Conf. Fuzzy Syst., 2004, vol. 1, pp. 407-410.
  14. L. G. Valiant, A theory of the learnable, Communication of the ACM, 27(11):1134 1142, November 1984.
  15. Michel J. Kearns and Umesh V. Vazirani, An Introduction to Computational Learning Theory, MIT Press, 1994.
  16. Freund and R. E. Schapire, A Decision-Theoretic Generalization Of Online Learn- ing And An Application To Boosting, J. Comput. Syst. Sci., vol. 55, no. 1, pp. 119-139, Aug. 1997.
  17. Vivek A Patole, V K Pachghare and Parag Kulkarni, AdaBoost Algorithm to Build Pattern Based Network Security, International Journal of Information Processing, 5(1), 57-63, 2011
  18. KDD Cup 1999. Available on: http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html , Ocotber 2007.
  19. M. Tavallaee, E. Bagheri, W. Lu, and A. Ghorbani, A Detailed Analysis of the KDD CUP 99 Data Set, Submitted to Second IEEE Symposium on Computational Intelligence for Security and Defense Applications (CISDA), 2009.
  20. NSL-KDD data set for network-based intrusion detection systems. Available on : http://iscx.ca/NSL-KDD/
Index Terms

Computer Science
Information Sciences

Keywords

Pattern supervised learning Intrusion detection system AdaBoost Machine Learning