Using Classification Algorithms in Building Models for Network Intrusion Detection


(*) Corresponding author


Authors' affiliations


DOI's assignment:
the author of the article can submit here a request for assignment of a DOI number to this resource!
Cost of the service: euros 10,00 (for a DOI)

Abstract


Network Intrusion Detection Systems are considered as one part of important and basic components of the security and protection system of computer networks. This issue encouraged researchers to engage in improving and enhancing the performance of these systems. Most of researches depend on KDDCup'99 Dataset, which contains structured data with four types of network attacks U2R, R2L, DOS and Probing. It has been recently focused on using Data Mining techniques in intrusion detection research since it employs a wide range of classification and clustering algorithms that can be used in building models to detect attacks accurately. Most previous studies and researches have shown that most classification detection models are based on one algorithm to detect all four types of attacks, and this in turn forms a starting point for aggregating several classification models to be used in detecting attacks and intrusions. In this paper we will compare between the performances of a set of classification algorithms implemented in WEKA to build detection models, and finally the constructed models will be employed in building a synthesis model that can detect attacks effectively at an acceptable level of accuracy.
Copyright © 2019 Praise Worthy Prize - All rights reserved.

Keywords


Classification, Data Mining, KDDCup'99, Networks Intrusion Detection Systems

Full Text:

PDF


References


Raju, P.N, (2005)- State-of-the-art Intrusion Detection: Technologies, Challenges, and Evaluation. Information theory Divison, Dept of Electrical Engineering, Linkoping University, 86 P.

Lappas, Th and Pelechrinis, K, (2007)- Data Mining Techniques for (Network) Intrusion Detection Systems. Department of Computer Science and Engineering UC Riverside, Riverside CA 92521.

Lee, W &Stolfo, S.J, (2000) - Data Mining Approaches for Intrusion Detection. Computer Science Department, Columbia University, New York.

Benferhat ,S & Sedki ,K and Tabia, K, (2007)- Preprocessing Rough Network Traffic For Intrusion Detection Purposes. CRIL-CNRS FRE, Université d'Artois, Faculté des Sciences Jean Perrin, Rue Jean Souvraz, France.

Tavallaee, M &Bagheri, E & Lu, W and Ghorbani, A.A ,(2009) -A Detailed Analysis of the KDDCUP99 Data Set. University of New Brunswick, Fredericton, NB, Canada and Institute for Information Technology, National Research Council Canada. Proceedings of the 2009 IEEE Symposium on Computational Intelligence in Security and Defence Applications( CISDA).

R. K. Cunningham, R. P. Lippmann, D. J. Fried, S. L. Garfinkel, I. Graf, K. R. Kendall, S. E. Webster, D. Wyschogrod, M. A. Zissman, (1999)- Evaluating Intrusion Detection Systems without Attacking your Friends: The 1998 DARPA Intrusion Detection Evaluation. Massachusetts inst of tech Lexington Lincoln lab.

Agarwal, R and Joshi, M.V, (2000)- PNrule: A New Framework for Learning Classifier Models in Data Mining. Tech. Report, Dept. of Computer Science, University of Minnesota.

I. Levin, (2000)- KDD-99 Classifier Learning Contest LLSoft’s Results Overview. SIGKDD Explorations, ACM SIGKDD.

L, Ertoz, M, Steinbach and V. Kumar, (2003)- Finding Clusters of Different Sizes, Shapes, and Densities in Noisy, High Dimensional Data, Technical Report.

Engen, V,(2010)- Machine Learning For Network Based Intrusion Detection, PhD Thesis. University of Bournemouth,UK.

Bouckaert, R & Frank, E & Hall, M &Kirkby, R &Reutemann, P &Seewald, A and Scuse, D ,(2012) - WEKA Manual for Version 3-6-8. University of waikato, 303P.

Bayesian network. Available on: https://en.wikipedia.org/wiki/Bayesian_network, (last modified on 20 July 2015).

Rish, I ,(2001)- An empirical study of the naive Bayes classifier. In: T.J. Watson Research Center, Research Gate.

C. Platt, J , (1998)- Sequential Minimal Optimization: A Fast Algorithm for Training Support Vector Machines. Microsoft Research, Technical Report MSR-TR-98-14.


Refbacks

  • There are currently no refbacks.



Please send any question about this web site to info@praiseworthyprize.com
Copyright © 2005-2024 Praise Worthy Prize