IJSRSET calls volunteers interested to contribute towards the scientific development in the field of Science, Engineering and Technology

Home > IJSRSET162650                                                     


Ant Colony Optimization for Intrusion Detection System Based on KNN and KNN-DS with detection of U2R, R2L attack for Network Probe Attack Detection

Authors(2):

Akarshika Rawat, Prof. Ankita Choubey
  • Abstract
  • Authors
  • Keywords
  • References
  • Details
The k-nearest neighbor (k-NN) is one of the most popular algorithms used for classification in various fields of pattern recognition & data mining problems. In k-nearest neighbor classification, the result of a new instance query is classified based on the majority of k-nearest neighbours. Recently researchers have begun paying attention to combining a set of individual k-NN classifiers, each using a different subset of features, with the hope of improving the overall classification accuracy. This paper describes a hybrid design for intrusion detection that combines anomaly detection with misuse detection. The proposed method includes an ensemble feature selecting classifier and a data mining classifier. The former consists of four classifiers using different sets of features and each of them employs a machine learning algorithm named fuzzy belief k-NN classification algorithm. The latter applies data mining technique to automatically extract computer users’ normal behavior from training network traffic data. The outputs of ensemble feature selecting classifier and data mining classifier are then fused together to get the final decision. The experimental results indicate that hybrid approach effectively generates a more accurate intrusion detection model on detecting both normal usages and malicious activities.

Akarshika Rawat, Prof. Ankita Choubey

Intrusion Detection; Machine Learning; Data Mining, KNN

  1. Allen, A. Christie, W. Fithian, J. McHugh, and J. Pickel,"State of the practice of intrusion detection technologies," in CMU/SEI-99-TR-028, 2014.
  2. Lunt, "Detecting intruders in computer systems," in Conference on Auditing and Computer Technology, 2013.
  3. M. Bridges and R. B. Vaughn, "Fuzzy data mining and genetic algorithms applied to intrusion detection," in National Information Systems Security Conference, October 2014.
  4. Mukkamala, J. Gagnon, and S. Jajodia, "Integrating data mining techniques with intrusion detection methods," in Advances in Database and Information Systems Security, 2014.
  5. Giacinto, F. Roli, and L. Didaci, Fusion of multiple classifiers for intrusion detection in computer networks, 2013.
  6. D. Lee, "Training a neural-network based intrusion detector to recognize novel attacks, systems, man and cybernetics," in IEEE Transactions on Computer, 2012, pp. 294–299.
  7. Paulo M. Mafra, Vinicius Moll, Joni da Silva Fraga and Altair Olivo Santin "Octopus-IIDS: An Anomaly Based Intelligent Intrusion Detection System", IEEE, 2010.
  8. Raghavan Muthuregunathan, Siddharth S, Srivathsan R and Rajesh SR "Efficient Snort Rule Generation using Evolutionary computing for Network Intrusion Detection", IEEE, First International Conference on Computational Intelligence, Communication Systems and Networks, 2009.
  9. Xu, A. Krzyzak and C.Y. Suen, "Several Methods for Combining Multiple Classifiers and Their Applications in Handwritten Character Recognition," IEEE Transactions on System, Man and Cybernetics, SMC-22(3), pp. 418-435, 1992.
  10. Raudys and F. Roli, "The Behavior Knowledge Space Fusion Method: Analysis of Generalization Error and Strategies for Performance Improvement," Proceedings of International Workshop on Multiple Classifier Systems, pp. 55-64, Guildford, Surrey, 2003.
  11. K. Hansen and P. Salamon, "Neural Network Ensembles," IEEE Transactions on Pattern Analysis Machine Intelligence, 12(10), pp. 993-1001, 1990.
  12. A. Dudani, "The Distance-Weighted k-NN Rule," IEEETransactions on Systems, Man and Cybernetics, vol. 6, no. 4, pp. 325-327, 1976.
  13. R. Quinlan, C4.5: Programs for Machine Learning, MorganKaufmann, 1993.
  14. Jones and R. S. Sielken, Computer System Intrusion Detection: ASurvey, Technical Report, Computer University of Virginia, 2000.
  15. N. Toosi and M. Kahani, "A Novel Soft Computing Model UsingAdaptive Neuro-Fuzzy Inference System for Intrusion Detection,"Networking, Sensing and Control, 2007 IEEE International Conference, pp. 834-839, London, UK, April 2007.
  16. Song, M. I. Heywood, and A. N. Zincir-Heywood, "Training Genetic Programming on Half a Million Patterns: An Example from Anomaly Detection," IEEE Transactions on Evolutionary Computation, 9(3), pp. 225-240, 2005.
  17. Keller, M. R. Gray, and J. A. Givens Jr., "A Fuzzy k-Nearest Neighbor Algorithms," Transactions on Systems, Man and Cybernetics, vol. SMC-15(4), pp. 580-585, 1985.
  18. Denoeux, "A k-Nearest Neighbor Classification Rule Based on Dempster-Shafer Theory," IEEE Transactions on System.

Publication Details

Published in : Volume 2 | Issue 6 | November-December - 2016
Date of Publication Print ISSN Online ISSN
2016-12-30 2395-1990 2394-4099
Page(s) Manuscript Number   Publisher
331-334 IJSRSET162650   Technoscience Academy

Cite This Article

Akarshika Rawat, Prof. Ankita Choubey, "Ant Colony Optimization for Intrusion Detection System Based on KNN and KNN-DS with detection of U2R, R2L attack for Network Probe Attack Detection", International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 2, Issue 6, pp.331-334, November-December-2016.
URL : http://ijsrset.com/IJSRSET162650.php