CHAPTER 4 DATA PREPROCESSING AND FEATURE SELECTION

Size: px
Start display at page:

Download "CHAPTER 4 DATA PREPROCESSING AND FEATURE SELECTION"

Transcription

1 55 CHAPTER 4 DATA PREPROCESSING AND FEATURE SELECTION In this work, an intelligent approach for building an efficient NIDS which involves data preprocessing, feature extraction and classification has been proposed and implemented. This type of new techniques are necessary since it is quiet complex to process huge amount of network traffic data in real time to detect intruders and take corrective actions. Therefore, the offline preprocessing of network data and extraction of most relevant features can be used to efficiently detect network attacks. Any decision making system which handles a very large volume of data requires effective data preprocessing. As the new ensemble soft computing techniques proposed in this research work directly handles huge volume of data on training, this preprocessing is very important for this work. Feature selection for an IDS (Mitra 00, Liu and Yu 005, Chen et al 006) helps to select the minimal subset of features essential for intrusion detection. Moreover, feature extraction reduces the dimensionality of instance and thus the overhead of the detection process is reduced. In this research work, GA is used to identify the most relevant features from dataset which are used in the classification of traffic data. On these selected items, proposed new soft computing paradigms have been applied to accurately capture the difference between intrusions and normal activities in order to detect intrusions effectively.

2 DATA SOURCE Regardless of the detection paradigm used, it is also vital to use relevant and essential features in order to build a NIDS. Normally, network traffic log data is not released by many organizations due to privacy concerns. Therefore, most IDSs are focused more on getting relevant data first since such systems lack good quality data. Many of the existing IDS overcome this issue by using an expert to program the system (Axelsson 1998) and simulate necessary data. Hence, in such systems it is the role of the expert to extract and refine relevant features to be provided to the IDS. Therefore, the accuracy of the output obtained is highly dependent on the individual who is the domain expert for providing data. One of the major limitations of this approach is that it is costlier and it doesn t consider novel attacks. Therefore, this proposed research work uses the benchmark dataset compiled for the 1999 KDD intrusion detection contest, by MIT Lincoln Labs (McHugh 000, Tavallaee et al 009). The main advantage of using this dataset is that the proposed research work is capable of providing significant data that are easily shared with other researchers and developers. The feedback obtained from other researchers allow to improve the result of this proposed work. The main reason for selecting KDD Cup 99 dataset is that currently, it is the mostly used comprehensive data set that is shared by many researchers. In this dataset, 41 attributes ( Table 4.1) are used in each record to characterize network traffic behavour. Among this 41 attributes, 38 are numeric and 3 are symbolic. Features present in KDD data set are grouped into three categories and are discussed below.

3 57 Table 4.1 List of Features Available in KDD Cup 99 Dataset S.No Feature Name Description Type 1. Duration length (number of seconds) of the connection Continuous. Protocol_type type of the protocol, e.g. tcp, udp, etc. Discrete 3. Service network service on the destination e.g. Discrete http, telnet, etc. 4. Src_bytes number of data bytes from source to Continuous destination 5. Dst_bytes number of data bytes from destination Continuous to source 6. Flag normal or error status of the Discrete connection 7. Land 1 if connection is from/to the same Discrete host/port; 0 otherwise 8. Wrong_fragment number of ``wrong'' fragments Continuous 9. Urgent number of urgent packets Continuous 10. Hot number of ``hot'' indicators Continuous 11. Num_failed_logins number of failed login attempts Continuous 1. Logged_in 1 if successfully logged in; 0 otherwise Discrete 13. Num_compromised number of ``compromised'' conditions Continuous 14. Root_shell 1 if root shell is obtained; 0 otherwise Discrete 15. Su_attempted 1 if ``su root'' command attempted; 0 Discrete otherwise 16. Num_root number of ``root'' accesses Continuous 17. Num_file_creations number of file creation operations Continuous 18. Num_shells number of shell prompts Continuous 19. Num_access_files number of operations on access control Continuous files 0. Num_outbound_cmd number of outbound commands in an Continuous s ftp session 1. Is_host_login 1 if the login belongs to the ``host'' list; Discrete 0 otherwise. Is_guest_login 1 if the login is a ``guest''login; 0 otherwise Discrete 3. Count number of connections to the same host Continuous as the current connection in the past two seconds

4 58 Table 4.1 (Continued) S.No Feature Name Description Type 4. Serror_rate % of connections that have ``SYN'' Continuous errors 5. Rerror_rate % of connections that have ``REJ'' Continuous errors 6. Same_srv_rate % of connections to the same service Continuous 7. Diff_srv_rate % of connections to different services Continuous 8. Srv_count number of connections to the same Continuous service as the current connection in the past two seconds 9. Srv_serror_rate % of connections that have ``SYN'' Continuous errors 30. Srv_rerror_rate % of connections that have ``REJ'' Continuous errors 31. Srv_diff_host_rate % of connections to different hosts Continuous 3. Dst_host_count count of connections having the same destination host Continuous 33. Dst_host_srv_count count of connections having the same Continuous destination host and using the same service 34. Dst_host_same_srv_r % of connections having the same Continuous ate destination host and using the same service 35. Dst_host_diff_srv_ra % of different services on the current Continuous te host 36. Dst_host_same_src_ port_rate % of connections to the current host having the same src port Continuous 37. Dst_host_srv_diff_ho % of connections to the same service Continuous st_rate coming from different hosts 38. Dst_host_serror_rate % of connections to the current host that have an S0 error Continuous 39. Dst_host_srv_serror_ rate % of connections to the current host and specified service that have an S0error 40. Dst_host_rerror_rate % of connections to the current host that have an RST error 41. Dst_host_srv_rerror_ % of connections to the current host rate and specified service that have an RST error Continuous Continuous Continuous

5 59 a. Basic Features: Basic features comprises of all the attributes that are extracted from a TCP/IP connection. These features are extracted from the packet header and includes src_bytes, dst_bytes, protocol etc b. Content Features: These features are used to evaluate the payload of the original TCP packet and looks for suspicious behavior in the payload portion. This includes features such as the number of failed login attempts, number of file creation operations etc. Moreover, most of the and UR attacks don t have any frequent sequential patterns. This is due to the fact that DoS and Probing attacks involve many connections to some host(s) in a very short duration of time but the and UR attacks are embedded in the data portions of the packets, and generally involves only a single connection. So to detect these kinds of attacks, content based features are used. c. Traffic Features: These include features that are computed with respect to a window interval and are divided into two categories i) Same host features: These features are derived only by examining the connections in the past seconds that have the same destination host as the current connection, and compute statistics related to protocol behavior, service etc. ii) Same service features: These features examine only the connections in the past seconds that have the same service as the current connection. The above two types are called time based traffic features.

6 60 Apart from these, there are various slow probing attacks that scan the hosts or ports using time interval greater than seconds. As a result, these types of attacks do not generate intrusion patterns with a time window of seconds. To overcome this problem, the same host and same service features are normally re-computed using a connection window of 100 connections. These types of features are called connection-based traffic features. The distribution of records in this dataset is provided in Table 4.. Table 4. Distribution of Data in KDD Cup 99 Dataset Attacks Data Normal Probe Dos UR Training Data 19.69% 0.83% 79.4% 0.01% 0.3% Test Data 19.48% 1.34% 73.9% 0.07% 5.1% 4. DATA PREPROCESSING The need for data preprocessing can be seen from the fact that redundant data and insignificant features may often confuse the classification algorithm, leading to the discovery of inaccurate or ineffective knowledge. Moreover, the processing time will increase when all features are used. Finally, preprocessing helps to remove the redundant data, incomplete data and transforms the data into a uniform format. The preprocessing module of the proposed system performs the following functionalities: i. Performs redundancy check and handles null values ii. Converts categorical data to numerical data

7 Redundancy Check The major limitation with KDD Cup 99 dataset is the presence of redundant records. The occurrence of redundant instances causes the learning algorithm to be biased towards frequent records and unbiased towards infrequent records. After redundancy check, it has been found that most of the redundant records are present in the anomaly class than in the normal class. The detection accuracy has been increased when these redundant records have been removed. For instance, the learning algorithm is unbiased towards class, as the percentage of records in class is very less in the KDD Cup 99 dataset and due to the redundant and enormous records present in other classes like DoS. Table 4.3 Distribution of Records in Training and Test Dataset Before and After Redundancy Removal Class Total No. of Records in KDD Cup 99 Training Set No. of Unique Records after Redundancy Removal Test Set Total No. Of Records in KDD Cup 99 No. of Unique Records after Redundancy Removal Known Unknown Known Unknown Normal DoS Probe UR Table 4.3 shows the number of records present in the KDD Cup 99 dataset and the number of records obtained after redundancy removal for both training and test dataset. It has been inferred that there is a large reduction in number of records for DoS attack when compared to other classes. Additionally, there are no duplicate records present in the training set for UR attack.

8 6 4.. Influence Calculation The 41 features in the KDD Cup 99 dataset are converted into a standardized numerical representation. Since there are categorical and numerical attributes available in the KDD Cup 99 dataset, the categorical attribute values have been converted into numerical one. This process involves calculation of influence value for each of the categorical attributes using the influence calculation formula given in Equation (4.1) so that the classification can be carried out effectively due to uniformity in data. # AttributeA bnormal Influence( I) (4.1) # Abnormal where #AttributeAbnormal is the number of abnormal records in which the attribute type is present and #Abnormal is the total number of abnormal records. For example, to find the influence value of service type HTTP, the number of abnormal records in which HTTP is present is divided by total number of abnormal records. The influence value calculated is more for the service type which occur frequently, as the attacker uses this service type to attack the network more often when compared to other service types. Table 4.4, Table 4.5 and Table 4.6 list the sample influence values calculated for service type, flag and protocol. Table 4.4 Influence Values Obtained for Protocols Using the Proposed Method Protcol Influence Value UDP TCP ICMP

9 63 Table 4.5 Sample Influence Values Obtained for Flags Using the Proposed Method Flag Influence Value Rstr S Rej Table 4.6 Sample Influence Values Obtained for Service Types using Proposed Method Service Type Influence Value Ecr_i ftp_data Eco_i Private GENETIC FEATURE SELECTION Most real life problems need an optimal and acceptable solution rather than calculating them precisely at the cost of degraded performance, time and space complexities. Therefore, it is necessary to carry out the analysis using selected features. The problem of selecting significant features from KDD Cup 99 dataset for intrusion detection cannot be represented in terms of formula since it is too complex. Moreover, when all the features are used without feature selection, it takes very longer time to calculate a solution precisely. Therefore the feasible approach is to use a heuristic method which performs feature selection effectively. GA (Goldberg 1989) is a heuristic,

10 64 which means that it estimates a solution and generates optimized results. Among various heuristic methods, GA (Stein et al 005) is more promising since it differs in many ways from other heuristics. First, GA works on population of possible solutions, while other heuristic methods use a single solution in their iterations. Second, most heuristics are probabilistic or stochastic, in nature and hence they are not deterministic. On the other hand, each individual in the GA population contributes well to obtain a possible solution to the problem. In GA, the algorithm starts with a set of possible solutions represented by chromosomes called population. Potential solution to specific problem is encoded in the form of chromosome. Solutions from one population are taken and used to form a new population. Solutions which are selected to form new solutions called offspring and are selected according to their fitness value. The more suitable they are the more chances they have to reproduce. Finally, GAs are more suitable in reducing the search space. Therefore, the convergence of the algorithm is faster when GA is employed Proposed Feature Selection Technique Using GA Genetic based feature selection algorithm has been used in this work in order to select suitable subset of features so that they are potentially useful in classification. Another advantage of GA based feature selection in this work is that it finds and eliminates the redundant features if any because these redundant features may misguide in clustering or classification. The reduction in number of features reduces the training time and ambiguousness. So in this thesis work, a weighted sum genetic feature selection algorithm has been proposed which has increased global search capability and is better in attribute interaction when compared to other algorithm like greedy method.

11 Proposed Framework for Genetic Feature Selection The framework for the genetic feature selection proposed and implemented in this research work is given in Figure Random Subset Generation Subset generation (Curry et al 007) is a method of heuristic search, in which each instance in the search space specifies a candidate solution for subset evaluation. The decision process of this method is determined by some basic issues. Initially, the search starting point must be decided since it controls the direction of search. Feature selection search starts either with null set where features are added one by one or it starts with a full set of features and is eliminated one by one. But these methods have drawback of being trapped into local optima (Doak 199). Therefore, in order to avoid this, the proposed work employs a random search. Preprocessed KDD Dataset with 41 Features Random Subset Generation Evaluation of Subset using Fitness Function Newly Generated Subset Unoptimized Feature Set Genetic Operations Relevant Features Optimal Feature Set Validation of Result Figure 4.1 Proposed Framework for Genetic Feature Extraction Sub-Module

12 66 Next, a search strategy is decided. A dataset with N features have N candidate subsets. This value is very large for moderate and large value of N. In the proposed case, there are 41 candidate subsets which is quite large. There are three different types of search strategies. They are complete, sequential and random. Complete search like branch and bound are exhaustive search. Sequential search like greedy hill climbing add or remove features one at a time and find optimal feature. Random search generates the subset in a completely random manner i.e., it does not follow any deterministic rule. When compared to above two approaches, the utilization of randomness helps to escape local optima in the search space and optimal subset is obtained Evaluation of Subset After the subset is generated, it is evaluated using an evaluation criterion. The best or optimal subset of features obtained using one criterion may not be optimal according to another criterion. Based on the dependency of evaluation of subset on classification or clustering algorithm applied at the end, feature subset evaluation criterion can be classified into independent criterion or dependent criterion. Commonly used independent criteria are distance measures, information measures, dependency measures, and consistency measures. If a feature incurs greater difference which is computed using the above criteria than other features then the feature that incurs greater difference is considered. This evaluation criterion uses the intrinsic characteristics of the dataset without applying any classification or clustering algorithms. On the other hand, dependent criterion uses the performance of the classification or clustering algorithm on the selected feature subset in identifying essential features. This approach gives superior performance as it selects features based on the classification or clustering algorithm applied.

13 67 The approach proposed in this thesis uses dependent criterion for selecting significant features which are used in the detection process. Here predictive accuracy and feature count are used as the primary measures. Even though the computational complexity of this approach is higher when compared to independent measure, it provides more detection accuracy. Since feature selection is performed offline, the complexity involved in this is not related to the detection process and hence the time taken is immaterial Stopping Criteria A stopping criterion determines when the feature extraction algorithm should stop. The proposed algorithm terminates, when any one of the following condition is met. i. The search completes when the maximum number of iteration is reached ii. When a good subset is selected i.e., the difference between previous fitness and current fitness is less than the given tolerance value Validation of Results One direct way of result validation is based on the prior knowledge about the data. But in real-world applications, such prior knowledge is not available. Hence, the proposed approach relies on indirect method which monitors the change of detection algorithm performance with the change of features. Experiments have been conducted with full set of features and selected subset of features to compare the performance of classifier. From these experiments, it has been found that the detection accuracy is almost same in both the cases. Therefore, feature selection can be carried out to improve the performance of the system.

14 Proposed Algorithm for Genetic Feature Selection Algorithm: Feature set selection using weighted sum GA. Input: Network traffic pattern (All features), Number of generations, Population size, Crossover probability (P c ), Mutation probability (P m ). Output: Set of selected features. Genetic_Feature_Selection( ) { 1. Initialize the population randomly with the size of each chromosome as 41.Each gene value in the chromosome can be 0 or 1. A bit value of 0 represents that the corresponding feature is not present in chromosome and 1 represents that the feature is present.. Initialize the weights W 1 = 0.7, W = 0.3, N (total number of records in the training set), P c and P m. 3. For each chromosome in the new population { a. Apply uniform crossover with a probability P c. b. Apply mutation operator to the chromosome with a probability P m. c. Evaluate fitness = W 1 * Accuracy + W * (1/ Count of Ones) } 4. If (Current_fitness Previous_fitness < ) then exit 5. Select the top best 60% of chromosomes into new population using tournament selection. 6. If number of generations is not reached, go to line 3. }

15 Experimental Topology Experiments have been conducted using KDD Cup 99 dataset for effective feature extraction and this dataset contains different attack types. It contains more instances of attacks than normal patterns and the attack types are not represented equally. The different attack types present in both KDD Cup 99 training and test dataset, and their associated class is listed in Table 4.7. In addition to the different attack types present in the KDD Cup 99 dataset, 17 new attack types are included in the KDD Cup 99 test set. Therefore, KDD Cup 99 test set contains both known and unknown types of attack. Those attacks that are present in the KDD Cup 99 training set and also in the test set are known attacks whereas those attacks that are not present in the KDD Cup 99 training set and present in the test set are unknown attack types. The inclusion of known and unknown types of attack in KDD Cup 99 test set makes intrusion detection more realistic. In addition, the training and test dataset are not of same probability distribution. Different feature sets have been obtained for three different intrusion detection modules proposed in this research work for effective decision making. Table 4.7 lists the specific known class types and their number of records present in Train and Test set before and after redundancy removal. Table 4.8 lists the unknown attack types and their associated class label in the test dataset. It also shows the number of records present in the test set after redundancy removal. The presence of these repeated records in the test set will cause the validation and test results to be biased by the algorithms which have better accuracy on the frequent records.

16 70 Table 4.7 Different Known Attack Types Present in KDD Cup 99 Dataset S.No Specific Class Types Class Total No. of Samples Unique Samples Train Test Train Test 1 Normal Normal Smurf Neptune Back Teardrop Pod Land 3 Satan Ipsweep Portsweep Nmap 4 Warezclient Guess_passwd Warezmaster Imap Ftp_write Multihop Phf Spy 5 Buffer_overflow Rootkit Loadmodule Perl DoS DoS DoS DoS DoS DoS Probe Probe Probe Probe UR UR UR UR Total

17 71 Table 4.8 Different Unknown Attack Types Present in Test Dataset S.No Attack Types Class Total No. of Samples Unique Samples 1 Mailbomb DoS Processtable DoS Apache DoS Udpstorm DoS Mscan Probe Saint Probe Snmpgetattack Snmpguess Named Xsnoop 4 4 Worm Xlock 9 9 Sendmail HTTPtunnel UR Ps UR Xterm UR Sqlattack UR Total Chromosome Representation Each network traffic pattern is represented as a vector of 41 features, which are the signatures of the respective network behavior. Every chromosome in the population has 41 genes. Each feature is linked with one bit in the chromosome. If the i th bit is 1, then the i th feature is selected and

18 7 used in classification of pattern for intrusion detection, otherwise, that feature is not selected. Each chromosome thus represents a different subset of features. A sample chromosome is shown below Initial Population The initial population is generated randomly. The number of 1 s for each individual is generated randomly, to form different subset of features. Then, the 1 s are randomly placed in the chromosome Weighted Sum Fitness Evaluation The aim of weighted sum fitness evaluation is to use fewer features to attain similar or better performance. Fitness of a chromosome is evaluated based upon the accuracy from the validation dataset and number of features present in a chromosome. Accuracy is calculated using the formula (TP+TN)/(P+N) where TP and TN are the number of records correctly classified in normal and abnormal classes respectively. P and N are the total number of records in normal and abnormal classes respectively. Each feature subset contains a list of features. If two subsets attain the same performance, while having different number of features, the subset with fewer features have been chosen. Among accuracy and number of features, accuracy is the key concern, so more weightage to accuracy (W 1 =0.7) is given than number of features (W =0.3) to be selected. The fitness function is obtained by combining the above terms: fitness = 0.7 X Accuracy X (1/ Count of Ones) (4.)

19 73 where Accuracy is the classification rate that an individual achieves on validation dataset and Count of Ones is the number of ones in the chromosome. The number of ones ranges from 1 to 41 where 41 is the size of the chromosome. Among the 41 bit in the chromosome, it is assured that no all bits are zero as; at least one feature is required in classification of normal and anomalous pattern. In general, higher accuracy implies higher fitness. Also, fitness increases if less number of features used i.e., if less number of 1 s present in a chromosome. A point to be noted is that chromosome with higher accuracy would outweigh chromosome with lower accuracy, independent of number of features present Crossover and Mutation Operators Crossover operator explores the combinations of current chromosome while mutation operator generate new chromosome. Various types of crossover operator include single point crossover, two point crossover and uniform crossover. There are 41 features present in the traffic pattern and these features may be independent or dependent on each other. If dependent features are away from each other in the chromosome, it is possible that single point crossover may destroy the schemata. To overcome this difficulty, uniform crossover is used. In uniform crossover, bits are randomly copied from the first or from the second parent chromosome depending on the value of mask. A mask is generated randomly with length equal to the length of the chromosome used for crossover. The mask determines which bits are copied from one parent and which bits from the other parent. Mutation inverts a bit in the population with a probability P m. The role of mutation operator is to restore the lost genetic material. The parameters P c and P m are adjusted to achieve good results for the experiments conducted.

20 Selection Operator Selection operator selects chromosome from population of individuals for next generation. Various selection operators include roulette selection, rank selection, tournament selection and random selection. This proposed work utilizes tournament selection to select the fittest chromosome. Tournament selection selects subgroup of chromosomes from the initial population where individuals within each subgroup compete against each other. This is because only one chromosome from each subgroup is chosen for next generation Features Selected In this work, a wrapper approach has been followed in order to select subset of features from the original feature set. This wrapper approach based feature selection is based on cascading of weighted sum GA and neurotree or neuro-genetic or genetic-x-means. The predictive accuracy of the classification algorithm (neurotree or neuro-genetic) or the clustering algorithm (genetic-x-means) is used as a metric in extracting significant features. The importance of the features selected by GA is evaluated based on neurotree or neuro-genetic or genetic-x-means. Therefore, different feature subsets are generated for neurotree, neuro-genetic and genetic-x-means paradigms. Seventeen and nine significant features are generated by weighted sum GA for neurotree and neuro-genetic classification algorithm respectively. Similarly, 13 relevant features are generated by weighted sum GA from the 41 features using genetic-x-means as the clustering algorithm to control the selection of features. From the experiments conducted using these features, it has been observed that feature selection reduces the training and testing time and at the same time produces similar accuracy as that of full feature set.

CHAPTER V KDD CUP 99 DATASET. With the widespread use of computer networks, the number of attacks has grown

CHAPTER V KDD CUP 99 DATASET. With the widespread use of computer networks, the number of attacks has grown CHAPTER V KDD CUP 99 DATASET With the widespread use of computer networks, the number of attacks has grown extensively, and many new hacking tools and intrusive methods have appeared. Using an intrusion

More information

A Technique by using Neuro-Fuzzy Inference System for Intrusion Detection and Forensics

A Technique by using Neuro-Fuzzy Inference System for Intrusion Detection and Forensics International OPEN ACCESS Journal Of Modern Engineering Research (IJMER) A Technique by using Neuro-Fuzzy Inference System for Intrusion Detection and Forensics Abhishek choudhary 1, Swati Sharma 2, Pooja

More information

Network attack analysis via k-means clustering

Network attack analysis via k-means clustering Network attack analysis via k-means clustering - By Team Cinderella Chandni Pakalapati cp6023@rit.edu Priyanka Samanta ps7723@rit.edu Dept. of Computer Science CONTENTS Recap of project overview Analysis

More information

INTRUSION DETECTION SYSTEM

INTRUSION DETECTION SYSTEM INTRUSION DETECTION SYSTEM Project Trainee Muduy Shilpa B.Tech Pre-final year Electrical Engineering IIT Kharagpur, Kharagpur Supervised By: Dr.V.Radha Assistant Professor, IDRBT-Hyderabad Guided By: Mr.

More information

CHAPTER 2 DARPA KDDCUP99 DATASET

CHAPTER 2 DARPA KDDCUP99 DATASET 44 CHAPTER 2 DARPA KDDCUP99 DATASET 2.1 THE DARPA INTRUSION-DETECTION EVALUATION PROGRAM The number of intrusions is to be found in any computer and network audit data are plentiful as well as ever-changing.

More information

Analysis of FRAUD network ACTIONS; rules and models for detecting fraud activities. Eren Golge

Analysis of FRAUD network ACTIONS; rules and models for detecting fraud activities. Eren Golge Analysis of FRAUD network ACTIONS; rules and models for detecting fraud activities Eren Golge FRAUD? HACKERS!! DoS: Denial of service R2L: Unauth. Access U2R: Root access to Local Machine. Probing: Survallience....

More information

Selecting Features for Intrusion Detection: A Feature Relevance Analysis on KDD 99 Intrusion Detection Datasets

Selecting Features for Intrusion Detection: A Feature Relevance Analysis on KDD 99 Intrusion Detection Datasets Selecting Features for Intrusion Detection: A Feature Relevance Analysis on KDD 99 Intrusion Detection Datasets H. Günes Kayacık, A. Nur Zincir-Heywood, Malcolm I. Heywood Dalhousie University, Faculty

More information

Classification of Attacks in Data Mining

Classification of Attacks in Data Mining Classification of Attacks in Data Mining Bhavneet Kaur Department of Computer Science and Engineering GTBIT, New Delhi, Delhi, India Abstract- Intrusion Detection and data mining are the major part of

More information

Big Data Analytics: Feature Selection and Machine Learning for Intrusion Detection On Microsoft Azure Platform

Big Data Analytics: Feature Selection and Machine Learning for Intrusion Detection On Microsoft Azure Platform Big Data Analytics: Feature Selection and Machine Learning for Intrusion Detection On Microsoft Azure Platform Nachirat Rachburee and Wattana Punlumjeak Department of Computer Engineering, Faculty of Engineering,

More information

Detection of DDoS Attack on the Client Side Using Support Vector Machine

Detection of DDoS Attack on the Client Side Using Support Vector Machine Detection of DDoS Attack on the Client Side Using Support Vector Machine Donghoon Kim * and Ki Young Lee** *Department of Information and Telecommunication Engineering, Incheon National University, Incheon,

More information

Classification Trees with Logistic Regression Functions for Network Based Intrusion Detection System

Classification Trees with Logistic Regression Functions for Network Based Intrusion Detection System IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 19, Issue 3, Ver. IV (May - June 2017), PP 48-52 www.iosrjournals.org Classification Trees with Logistic Regression

More information

A Study on NSL-KDD Dataset for Intrusion Detection System Based on Classification Algorithms

A Study on NSL-KDD Dataset for Intrusion Detection System Based on Classification Algorithms ISSN (Online) 2278-121 ISSN (Print) 2319-594 Vol. 4, Issue 6, June 215 A Study on NSL-KDD set for Intrusion Detection System Based on ification Algorithms L.Dhanabal 1, Dr. S.P. Shantharajah 2 Assistant

More information

FUZZY KERNEL C-MEANS ALGORITHM FOR INTRUSION DETECTION SYSTEMS

FUZZY KERNEL C-MEANS ALGORITHM FOR INTRUSION DETECTION SYSTEMS FUZZY KERNEL C-MEANS ALGORITHM FOR INTRUSION DETECTION SYSTEMS 1 ZUHERMAN RUSTAM, 2 AINI SURI TALITA 1 Senior Lecturer, Department of Mathematics, Faculty of Mathematics and Natural Sciences, University

More information

CHAPTER 5 CONTRIBUTORY ANALYSIS OF NSL-KDD CUP DATA SET

CHAPTER 5 CONTRIBUTORY ANALYSIS OF NSL-KDD CUP DATA SET CHAPTER 5 CONTRIBUTORY ANALYSIS OF NSL-KDD CUP DATA SET 5 CONTRIBUTORY ANALYSIS OF NSL-KDD CUP DATA SET An IDS monitors the network bustle through incoming and outgoing data to assess the conduct of data

More information

Analysis of Feature Selection Techniques: A Data Mining Approach

Analysis of Feature Selection Techniques: A Data Mining Approach Analysis of Feature Selection Techniques: A Data Mining Approach Sheena M.Tech Scholar CSE, SBSSTC Krishan Kumar Associate Professor CSE, SBSSTC Gulshan Kumar Assistant Professor MCA, SBSSTC ABSTRACT Feature

More information

CHAPTER 7 Normalization of Dataset

CHAPTER 7 Normalization of Dataset Introduction CHAPTER 7 7.1 Introduction Objective of this chapter is to address dataset normalization. From our detailed literature review and also from our previous experiments of [9], we found following

More information

Classifying Network Intrusions: A Comparison of Data Mining Methods

Classifying Network Intrusions: A Comparison of Data Mining Methods Association for Information Systems AIS Electronic Library (AISeL) AMCIS 2005 Proceedings Americas Conference on Information Systems (AMCIS) 2005 Classifying Network Intrusions: A Comparison of Data Mining

More information

Independent degree project - first cycle Bachelor s thesis 15 ECTS credits

Independent degree project - first cycle Bachelor s thesis 15 ECTS credits Fel! Hittar inte referenskälla. - Fel! Hittar inte referenskälla.fel! Hittar inte referenskälla. Table of Contents Independent degree project - first cycle Bachelor s thesis 15 ECTS credits Master of Science

More information

Discriminant Analysis based Feature Selection in KDD Intrusion Dataset

Discriminant Analysis based Feature Selection in KDD Intrusion Dataset Discriminant Analysis based Feature Selection in KDD Intrusion Dataset Dr.S.Siva Sathya Department of Computer Science Pondicherry University, Puducherry,India. Dr. R.Geetha Ramani Department of Computer

More information

Intrusion Detection System Based on K-Star Classifier and Feature Set Reduction

Intrusion Detection System Based on K-Star Classifier and Feature Set Reduction IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 15, Issue 5 (Nov. - Dec. 2013), PP 107-112 Intrusion Detection System Based on K-Star Classifier and Feature

More information

Data Mining Approaches for Network Intrusion Detection: from Dimensionality Reduction to Misuse and Anomaly Detection

Data Mining Approaches for Network Intrusion Detection: from Dimensionality Reduction to Misuse and Anomaly Detection Data Mining Approaches for Network Intrusion Detection: from Dimensionality Reduction to Misuse and Anomaly Detection Iwan Syarif 1,2, Adam Prugel-Bennett 1, Gary Wills 1 1 School of Electronics and Computer

More information

A Hierarchical SOM based Intrusion Detection System

A Hierarchical SOM based Intrusion Detection System * Text + Figure(s) + Table(s) A Hierarchical SOM based Intrusion Detection System H. Gunes Kayacik, A. Nur Zincir-Heywood, Malcolm I. Heywood Dalhousie University, Faculty of Computer Science, 6050 University

More information

Anomaly Intrusion Detection System Using Hierarchical Gaussian Mixture Model

Anomaly Intrusion Detection System Using Hierarchical Gaussian Mixture Model 264 IJCSNS International Journal of Computer Science and Network Security, VOL.8 No.8, August 2008 Anomaly Intrusion Detection System Using Hierarchical Gaussian Mixture Model M. Bahrololum and M. Khaleghi

More information

International Journal of Scientific & Engineering Research, Volume 6, Issue 6, June ISSN

International Journal of Scientific & Engineering Research, Volume 6, Issue 6, June ISSN International Journal of Scientific & Engineering Research, Volume 6, Issue 6, June-2015 1496 A Comprehensive Survey of Selected Data Mining Algorithms used for Intrusion Detection Vivek Kumar Srivastava

More information

Unsupervised clustering approach for network anomaly detection

Unsupervised clustering approach for network anomaly detection Unsupervised clustering approach for network anomaly detection Iwan Syarif 1,2, Adam Prugel-Bennett 1, Gary Wills 1 1 School of Electronics and Computer Science, University of Southampton, UK {is1e08,apb,gbw}@ecs.soton.ac.uk

More information

On Dataset Biases in a Learning System with Minimum A Priori Information for Intrusion Detection

On Dataset Biases in a Learning System with Minimum A Priori Information for Intrusion Detection On Dataset Biases in a Learning System with Minimum A Priori Information for Intrusion Detection H. G. Kayacik A. N. Zincir-Heywood M. I. Heywood Dalhousie University Faculty of Computer Science Halifax,

More information

Anomaly detection using machine learning techniques. A comparison of classification algorithms

Anomaly detection using machine learning techniques. A comparison of classification algorithms Anomaly detection using machine learning techniques A comparison of classification algorithms Henrik Hivand Volden Master s Thesis Spring 2016 Anomaly detection using machine learning techniques Henrik

More information

Feature Reduction for Intrusion Detection Using Linear Discriminant Analysis

Feature Reduction for Intrusion Detection Using Linear Discriminant Analysis Feature Reduction for Intrusion Detection Using Linear Discriminant Analysis Rupali Datti 1, Bhupendra verma 2 1 PG Research Scholar Department of Computer Science and Engineering, TIT, Bhopal (M.P.) rupal3010@gmail.com

More information

Machine Learning for Network Intrusion Detection

Machine Learning for Network Intrusion Detection Machine Learning for Network Intrusion Detection ABSTRACT Luke Hsiao Stanford University lwhsiao@stanford.edu Computer networks have become an increasingly valuable target of malicious attacks due to the

More information

NAVAL POSTGRADUATE SCHOOL THESIS

NAVAL POSTGRADUATE SCHOOL THESIS NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA THESIS NEURAL DETECTION OF MALICIOUS NETWORK ACTIVITIES USING A NEW DIRECT PARSING AND FEATURE EXTRACTION TECHNIQUE by Cheng Hong Low September 2015 Thesis

More information

A COMPARATIVE STUDY OF DATA MINING ALGORITHMS FOR NETWORK INTRUSION DETECTION IN THE PRESENCE OF POOR QUALITY DATA (complete-paper)

A COMPARATIVE STUDY OF DATA MINING ALGORITHMS FOR NETWORK INTRUSION DETECTION IN THE PRESENCE OF POOR QUALITY DATA (complete-paper) A COMPARATIVE STUDY OF DATA MINING ALGORITHMS FOR NETWORK INTRUSION DETECTION IN THE PRESENCE OF POOR QUALITY DATA (complete-paper) Eitel J.M. Lauría Marist College Eitel.Lauria@Marist.edu Giri K. Tayi

More information

An Intrusion Prediction Technique Based on Co-evolutionary Immune System for Network Security (CoCo-IDP)

An Intrusion Prediction Technique Based on Co-evolutionary Immune System for Network Security (CoCo-IDP) International Journal of Network Security, Vol.9, No.3, PP.290 300, Nov. 2009 290 An Intrusion Prediction Technique Based on Co-evolutionary Immune System for Network Security (CoCo-IDP) Mohammad Reza

More information

A Hybrid Anomaly Detection Model using G-LDA

A Hybrid Anomaly Detection Model using G-LDA A Hybrid Detection Model using G-LDA Bhavesh Kasliwal a, Shraey Bhatia a, Shubham Saini a, I.Sumaiya Thaseen a, Ch.Aswani Kumar b a, School of Computing Science and Engineering, VIT University, Chennai,

More information

Data Reduction and Ensemble Classifiers in Intrusion Detection

Data Reduction and Ensemble Classifiers in Intrusion Detection Second Asia International Conference on Modelling & Simulation Data Reduction and Ensemble Classifiers in Intrusion Detection Anazida Zainal, Mohd Aizaini Maarof and Siti Mariyam Shamsuddin Faculty of

More information

IDuFG: Introducing an Intrusion Detection using Hybrid Fuzzy Genetic Approach

IDuFG: Introducing an Intrusion Detection using Hybrid Fuzzy Genetic Approach International Journal of Network Security, Vol.17, No.6, PP.754-770, Nov. 2015 754 IDuFG: Introducing an Intrusion Detection using Hybrid Fuzzy Genetic Approach Ghazaleh Javadzadeh 1, Reza Azmi 2 (Corresponding

More information

Performance improvement of intrusion detection with fusion of multiple sensors

Performance improvement of intrusion detection with fusion of multiple sensors Complex Intell. Syst. (2017) 3:33 39 DOI 10.1007/s40747-016-0033-5 ORIGINAL PAPER Performance improvement of intrusion detection with fusion of multiple sensors An evidence-theory-based approach Vrushank

More information

A COMPARATIVE STUDY OF CLASSIFICATION MODELS FOR DETECTION IN IP NETWORKS INTRUSIONS

A COMPARATIVE STUDY OF CLASSIFICATION MODELS FOR DETECTION IN IP NETWORKS INTRUSIONS A COMPARATIVE STUDY OF CLASSIFICATION MODELS FOR DETECTION IN IP NETWORKS INTRUSIONS 1 ABDELAZIZ ARAAR, 2 RAMI BOUSLAMA 1 Assoc. Prof., College of Information Technology, Ajman University, UAE 2 MSIS,

More information

RUSMA MULYADI. Advisor: Dr. Daniel Zeng

RUSMA MULYADI. Advisor: Dr. Daniel Zeng Evaluating Classification Algorithms for Intrusion Detection Systems RUSMA MULYADI Advisor: Dr. Daniel Zeng A Master Project Report Submitted to the Department of Management Information Systems In Partial

More information

Towards A New Architecture of Detecting Networks Intrusion Based on Neural Network

Towards A New Architecture of Detecting Networks Intrusion Based on Neural Network International Journal of Computer Networks and Communications Security VOL. 5, NO. 1, JANUARY 2017, 7 14 Available online at: www.ijcncs.org E-ISSN 2308-9830 (Online)/ ISSN 2410-0595 (Print) Towards A

More information

Bayesian Learning Networks Approach to Cybercrime Detection

Bayesian Learning Networks Approach to Cybercrime Detection Bayesian Learning Networks Approach to Cybercrime Detection N S ABOUZAKHAR, A GANI and G MANSON The Centre for Mobile Communications Research (C4MCR), University of Sheffield, Sheffield Regent Court, 211

More information

Combination of Three Machine Learning Algorithms for Intrusion Detection Systems in Computer Networks

Combination of Three Machine Learning Algorithms for Intrusion Detection Systems in Computer Networks Vol. () December, pp. 9-8 ISSN95-9X Combination of Three Machine Learning Algorithms for Intrusion Detection Systems in Computer Networks Ali Reza Zebarjad, Mohmmad Mehdi Lotfinejad Dapartment of Computer,

More information

Two Level Anomaly Detection Classifier

Two Level Anomaly Detection Classifier Two Level Anomaly Detection Classifier Azeem Khan Dublin City University School of Computing Dublin, Ireland raeeska2@computing.dcu.ie Shehroz Khan Department of Information Technology National University

More information

Experiments with Applying Artificial Immune System in Network Attack Detection

Experiments with Applying Artificial Immune System in Network Attack Detection Kennesaw State University DigitalCommons@Kennesaw State University KSU Proceedings on Cybersecurity Education, Research and Practice 2017 KSU Conference on Cybersecurity Education, Research and Practice

More information

Genetic-fuzzy rule mining approach and evaluation of feature selection techniques for anomaly intrusion detection

Genetic-fuzzy rule mining approach and evaluation of feature selection techniques for anomaly intrusion detection Pattern Recognition 40 (2007) 2373 2391 www.elsevier.com/locate/pr Genetic-fuzzy rule mining approach and evaluation of feature selection techniques for anomaly intrusion detection Chi-Ho Tsang, Sam Kwong,

More information

Ranking and Filtering the Selected Attributes for Intrusion Detection System

Ranking and Filtering the Selected Attributes for Intrusion Detection System Ranking and Filtering the Selected Attributes for Intrusion Detection System Phyu Thi Htun and Kyaw Thet Khaing Abstract Many researchers have been focused on improving the performance, especially in accuracy

More information

ATwo Stage Intrusion Detection Intelligent System

ATwo Stage Intrusion Detection Intelligent System ATwo Stage Intrusion Detection Intelligent System Nevrus Kaja, Adnan Shaout and Di Ma The University of Michigan Dearborn, United States Abstract Security is becoming an inherited and amplified problem

More information

Analysis of neural networks usage for detection of a new attack in IDS

Analysis of neural networks usage for detection of a new attack in IDS Annales UMCS Informatica AI X, 1 (2010) 51-59 DOI: 10.2478/v10065-010-0035-7 Analysis of neural networks usage for detection of a new attack in IDS Przemysław Kukiełka 1, Zbigniew Kotulski 2 1 Institute

More information

Anomaly based Network Intrusion Detection using Machine Learning Techniques.

Anomaly based Network Intrusion Detection using Machine Learning Techniques. Anomaly based Network Intrusion etection using Machine Learning Techniques. Tushar Rakshe epartment of Electrical Engineering Veermata Jijabai Technological Institute, Matunga, Mumbai. Vishal Gonjari epartment

More information

PAYLOAD BASED INTERNET WORM DETECTION USING NEURAL NETWORK CLASSIFIER

PAYLOAD BASED INTERNET WORM DETECTION USING NEURAL NETWORK CLASSIFIER PAYLOAD BASED INTERNET WORM DETECTION USING NEURAL NETWORK CLASSIFIER A.Tharani MSc (CS) M.Phil. Research Scholar Full Time B.Leelavathi, MCA, MPhil., Assistant professor, Dept. of information technology,

More information

Modeling Intrusion Detection Systems With Machine Learning And Selected Attributes

Modeling Intrusion Detection Systems With Machine Learning And Selected Attributes Modeling Intrusion Detection Systems With Machine Learning And Selected Attributes Thaksen J. Parvat USET G.G.S.Indratrastha University Dwarka, New Delhi 78 pthaksen.sit@sinhgad.edu Abstract Intrusion

More information

Why Machine Learning Algorithms Fail in Misuse Detection on KDD Intrusion Detection Data Set

Why Machine Learning Algorithms Fail in Misuse Detection on KDD Intrusion Detection Data Set Why Machine Learning Algorithms Fail in Misuse Detection on KDD Intrusion Detection Data Set Maheshkumar Sabhnani and Gursel Serpen Electrical Engineering and Computer Science Department The University

More information

Adaptive Framework for Network Intrusion Detection by Using Genetic-Based Machine Learning Algorithm

Adaptive Framework for Network Intrusion Detection by Using Genetic-Based Machine Learning Algorithm IJCSNS International Journal of Computer Science and Network Security, VOL.9 No.4, April 2009 55 Adaptive Framework for Network Intrusion Detection by Using Genetic-Based Machine Learning Algorithm Wafa'

More information

The Caspian Sea Journal ISSN: A Study on Improvement of Intrusion Detection Systems in Computer Networks via GNMF Method

The Caspian Sea Journal ISSN: A Study on Improvement of Intrusion Detection Systems in Computer Networks via GNMF Method Available online at http://www.csjonline.org/ The Caspian Sea Journal ISSN: 1578-7899 Volume 10, Issue 1, Supplement 4 (2016) 456-461 A Study on Improvement of Intrusion Detection Systems in Computer Networks

More information

INTRUSION DETECTION WITH TREE-BASED DATA MINING CLASSIFICATION TECHNIQUES BY USING KDD DATASET

INTRUSION DETECTION WITH TREE-BASED DATA MINING CLASSIFICATION TECHNIQUES BY USING KDD DATASET INTRUSION DETECTION WITH TREE-BASED DATA MINING CLASSIFICATION TECHNIQUES BY USING KDD DATASET Bilal Ahmad Department of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics,

More information

Intrusion Detection Based On Clustering Algorithm

Intrusion Detection Based On Clustering Algorithm International Journal of Electronics and Computer Science Engineering 1059 Available Online at www.ijecse.org ISSN- 2277-1956 Intrusion Detection Based On Clustering Algorithm Nadya El MOUSSAID 1, Ahmed

More information

ARTIFICIAL INTELLIGENCE APPROACHES FOR INTRUSION DETECTION.

ARTIFICIAL INTELLIGENCE APPROACHES FOR INTRUSION DETECTION. ARTIFICIAL INTELLIGENCE APPROACHES FOR INTRUSION DETECTION. Dima Novikov (Rochester Institute of Technology, Rochester, NY, dima.novikov@gmail.com), Roman V. Yampolskiy (University at Bufalo, Buffalo,

More information

Network Traffic Anomaly Detection Based on Packet Bytes ABSTRACT Bugs in the attack. Evasion. 1. INTRODUCTION User Behavior. 2.

Network Traffic Anomaly Detection Based on Packet Bytes ABSTRACT Bugs in the attack. Evasion. 1. INTRODUCTION User Behavior. 2. Network Traffic Anomaly Detection Based on Packet Bytes Matthew V. Mahoney Florida Institute of Technology Technical Report CS-2002-13 mmahoney@cs.fit.edu ABSTRACT Hostile network traffic is often "different"

More information

CHAPTER 6 HYBRID AI BASED IMAGE CLASSIFICATION TECHNIQUES

CHAPTER 6 HYBRID AI BASED IMAGE CLASSIFICATION TECHNIQUES CHAPTER 6 HYBRID AI BASED IMAGE CLASSIFICATION TECHNIQUES 6.1 INTRODUCTION The exploration of applications of ANN for image classification has yielded satisfactory results. But, the scope for improving

More information

Fuzzy Grids-Based Intrusion Detection in Neural Networks

Fuzzy Grids-Based Intrusion Detection in Neural Networks Fuzzy Grids-Based Intrusion Detection in Neural Networks Izani Islam, Tahir Ahmad, Ali H. Murid Abstract: In this paper, a framework is used for intrusion detection that shows the effectiveness of data

More information

Escaping Local Optima: Genetic Algorithm

Escaping Local Optima: Genetic Algorithm Artificial Intelligence Escaping Local Optima: Genetic Algorithm Dae-Won Kim School of Computer Science & Engineering Chung-Ang University We re trying to escape local optima To achieve this, we have learned

More information

Cloud Computing Intrusion Detection Using Artificial Bee Colony-BP Network Algorithm

Cloud Computing Intrusion Detection Using Artificial Bee Colony-BP Network Algorithm Cloud Computing Intrusion Detection Using Artificial Bee Colony-BP Network Algorithm Yang Hui SiChuan College of Architectural Technology Deyang 618000 China Journal of Digital Information Management ABSTRACT:

More information

Toward Building Lightweight Intrusion Detection System Through Modified RMHC and SVM

Toward Building Lightweight Intrusion Detection System Through Modified RMHC and SVM Toward Building Lightweight Intrusion Detection System Through Modified RMHC and SVM You Chen 1,2, Wen-Fa Li 1,2, Xue-Qi Cheng 1 1 Institute of Computing Technology, Chinese Academy of Sciences 2 Graduate

More information

An Intelligent CRF Based Feature Selection for Effective Intrusion Detection

An Intelligent CRF Based Feature Selection for Effective Intrusion Detection 44 The International Arab Journal of Information Technology An Intelligent CRF Based Feature Selection for Effective Intrusion Detection Sannasi Ganapathy 1, Pandi Vijayakumar 2, Palanichamy Yogesh 1,

More information

CHAPTER 5 ANT-FUZZY META HEURISTIC GENETIC SENSOR NETWORK SYSTEM FOR MULTI - SINK AGGREGATED DATA TRANSMISSION

CHAPTER 5 ANT-FUZZY META HEURISTIC GENETIC SENSOR NETWORK SYSTEM FOR MULTI - SINK AGGREGATED DATA TRANSMISSION CHAPTER 5 ANT-FUZZY META HEURISTIC GENETIC SENSOR NETWORK SYSTEM FOR MULTI - SINK AGGREGATED DATA TRANSMISSION 5.1 INTRODUCTION Generally, deployment of Wireless Sensor Network (WSN) is based on a many

More information

MODELLING DOCUMENT CATEGORIES BY EVOLUTIONARY LEARNING OF TEXT CENTROIDS

MODELLING DOCUMENT CATEGORIES BY EVOLUTIONARY LEARNING OF TEXT CENTROIDS MODELLING DOCUMENT CATEGORIES BY EVOLUTIONARY LEARNING OF TEXT CENTROIDS J.I. Serrano M.D. Del Castillo Instituto de Automática Industrial CSIC. Ctra. Campo Real km.0 200. La Poveda. Arganda del Rey. 28500

More information

Preprocessing of Stream Data using Attribute Selection based on Survival of the Fittest

Preprocessing of Stream Data using Attribute Selection based on Survival of the Fittest Preprocessing of Stream Data using Attribute Selection based on Survival of the Fittest Bhakti V. Gavali 1, Prof. Vivekanand Reddy 2 1 Department of Computer Science and Engineering, Visvesvaraya Technological

More information

Hybrid Feature Selection for Modeling Intrusion Detection Systems

Hybrid Feature Selection for Modeling Intrusion Detection Systems Hybrid Feature Selection for Modeling Intrusion Detection Systems Srilatha Chebrolu, Ajith Abraham and Johnson P Thomas Department of Computer Science, Oklahoma State University, USA ajith.abraham@ieee.org,

More information

Comparative Analysis of Classification Algorithms on KDD 99 Data Set

Comparative Analysis of Classification Algorithms on KDD 99 Data Set I. J. Computer Network and Information Security, 2016, 9, 34-40 Published Online September 2016 in MECS (http://www.mecs-press.org/) DOI: 10.5815/ijcnis.2016.09.05 Comparative Analysis of Classification

More information

An Efficient Decision Tree Model for Classification of Attacks with Feature Selection

An Efficient Decision Tree Model for Classification of Attacks with Feature Selection An Efficient Decision Tree Model for Classification of Attacks with Feature Selection Akhilesh Kumar Shrivas Research Scholar, CVRU, Bilaspur (C.G.), India S. K. Singhai Govt. Engineering College Bilaspur

More information

CHAPTER 2 CONVENTIONAL AND NON-CONVENTIONAL TECHNIQUES TO SOLVE ORPD PROBLEM

CHAPTER 2 CONVENTIONAL AND NON-CONVENTIONAL TECHNIQUES TO SOLVE ORPD PROBLEM 20 CHAPTER 2 CONVENTIONAL AND NON-CONVENTIONAL TECHNIQUES TO SOLVE ORPD PROBLEM 2.1 CLASSIFICATION OF CONVENTIONAL TECHNIQUES Classical optimization methods can be classified into two distinct groups:

More information

Performance Analysis of Big Data Intrusion Detection System over Random Forest Algorithm

Performance Analysis of Big Data Intrusion Detection System over Random Forest Algorithm Performance Analysis of Big Data Intrusion Detection System over Random Forest Algorithm Alaa Abd Ali Hadi Al-Furat Al-Awsat Technical University, Iraq. alaaalihadi@gmail.com Abstract The Internet has

More information

INTRUSION DETECTION MODEL IN DATA MINING BASED ON ENSEMBLE APPROACH

INTRUSION DETECTION MODEL IN DATA MINING BASED ON ENSEMBLE APPROACH INTRUSION DETECTION MODEL IN DATA MINING BASED ON ENSEMBLE APPROACH VIKAS SANNADY 1, POONAM GUPTA 2 1Asst.Professor, Department of Computer Science, GTBCPTE, Bilaspur, chhattisgarh, India 2Asst.Professor,

More information

Journal of Asian Scientific Research EFFICIENCY OF SVM AND PCA TO ENHANCE INTRUSION DETECTION SYSTEM. Soukaena Hassan Hashem

Journal of Asian Scientific Research EFFICIENCY OF SVM AND PCA TO ENHANCE INTRUSION DETECTION SYSTEM. Soukaena Hassan Hashem Journal of Asian Scientific Research journal homepage: http://aessweb.com/journal-detail.php?id=5003 EFFICIENCY OF SVM AND PCA TO ENHANCE INTRUSION DETECTION SYSTEM Soukaena Hassan Hashem Computer Science

More information

Towards an Efficient Anomaly-Based Intrusion Detection for Software-Defined Networks

Towards an Efficient Anomaly-Based Intrusion Detection for Software-Defined Networks Towards an Efficient Anomaly-Based Intrusion Detection for Software-Defined Networks In spite of the significant impact of using a centralized controller, the controller itself creates a single point of

More information

Distributed Detection of Network Intrusions Based on a Parametric Model

Distributed Detection of Network Intrusions Based on a Parametric Model Distributed Detection of Network Intrusions Based on a Parametric Model Yan-guo Wang, Xi Li, and Weiming Hu National Laboratory of Pattern Recognition Institute of Automation, Chinese Academy of Sciences

More information

Cooperative Anomaly and Intrusion Detection for Alert Correlation in Networked Computing Systems

Cooperative Anomaly and Intrusion Detection for Alert Correlation in Networked Computing Systems Cooperative Anomaly and Intrusion Detection for Alert Correlation in Networked Computing Systems Kai Hwang, Fellow IEEE, Hua Liu, Student Member and Ying Chen, Student Member Abstract: Network-centric

More information

Model Redundancy vs. Intrusion Detection

Model Redundancy vs. Intrusion Detection Model Redundancy vs. Intrusion Detection Zhuowei Li, Amitabha Das, and Sabu Emmanuel School of Computer Engineering, Nanyang Technological University, 50, Nanyang Avenue, Singapore 639798 zhwei.li@pmail.ntu.edu.sg

More information

The k-means Algorithm and Genetic Algorithm

The k-means Algorithm and Genetic Algorithm The k-means Algorithm and Genetic Algorithm k-means algorithm Genetic algorithm Rough set approach Fuzzy set approaches Chapter 8 2 The K-Means Algorithm The K-Means algorithm is a simple yet effective

More information

INTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATION ENGINEERING & TECHNOLOGY (IJECET) PROPOSED HYBRID-MULTISTAGES NIDS TECHNIQUES

INTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATION ENGINEERING & TECHNOLOGY (IJECET) PROPOSED HYBRID-MULTISTAGES NIDS TECHNIQUES INTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATION ENGINEERING & TECHNOLOGY (IJECET) International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 ISSN 0976 6464(Print)

More information

A hybrid network intrusion detection framework based on random forests and weighted k-means

A hybrid network intrusion detection framework based on random forests and weighted k-means Ain Shams Engineering Journal (2013) 4, 753 762 Ain Shams University Ain Shams Engineering Journal www.elsevier.com/locate/asej www.sciencedirect.com ELECTRICAL ENGINEERING A hybrid network intrusion detection

More information

DECISION TREE BASED IDS USING WRAPPER APPROACH

DECISION TREE BASED IDS USING WRAPPER APPROACH DECISION TREE BASED IDS USING WRAPPER APPROACH Uttam B. Jadhav 1 and Satyendra Vyas 2 1 Department of Computer Engineering, Kota University, Alwar, Rajasthan, India 2 Department of Computer Engineering,

More information

Intrusion detection system with decision tree and combine method algorithm

Intrusion detection system with decision tree and combine method algorithm International Academic Institute for Science and Technology International Academic Journal of Science and Engineering Vol. 3, No. 8, 2016, pp. 21-31. ISSN 2454-3896 International Academic Journal of Science

More information

System Health Monitoring and Reactive Measures Activation

System Health Monitoring and Reactive Measures Activation System Health Monitoring and Reactive Measures Activation Alireza Shameli Sendi Michel Dagenais Department of Computer and Software Engineering December 10, 2009 École Polytechnique, Montreal Content Definition,

More information

Deep Feature Extraction for multi-class Intrusion Detection in Industrial Control Systems

Deep Feature Extraction for multi-class Intrusion Detection in Industrial Control Systems Deep Feature Extraction for multi-class Intrusion Detection in Industrial Control Systems Sasanka Potluri and Christian Diedrich Abstract In recent days, network based communication is more vulnerable

More information

The Genetic Algorithm for finding the maxima of single-variable functions

The Genetic Algorithm for finding the maxima of single-variable functions Research Inventy: International Journal Of Engineering And Science Vol.4, Issue 3(March 2014), PP 46-54 Issn (e): 2278-4721, Issn (p):2319-6483, www.researchinventy.com The Genetic Algorithm for finding

More information

Analysis of KDD 99 Intrusion Detection Dataset for Selection of Relevance Features

Analysis of KDD 99 Intrusion Detection Dataset for Selection of Relevance Features Analysis of KDD 99 Intrusion Detection Dataset for Selection of Relevance Features Adetunmbi A.Olusola., Adeola S.Oladele. and Daramola O.Abosede Abstract - The rapid development of business and other

More information

A Rough Set Based Feature Selection on KDD CUP 99 Data Set

A Rough Set Based Feature Selection on KDD CUP 99 Data Set Vol.8, No.1 (2015), pp.149-156 http://dx.doi.org/10.14257/ijdta.2015.8.1.16 A Rough Set Based Feature Selection on KDD CUP 99 Data Set Vinod Rampure 1 and Akhilesh Tiwari 2 Department of CSE & IT, Madhav

More information

An Active Rule Approach for Network Intrusion Detection with Enhanced C4.5 Algorithm

An Active Rule Approach for Network Intrusion Detection with Enhanced C4.5 Algorithm I. J. Communications, Network and System Sciences, 2008, 4, 285-385 Published Online November 2008 in SciRes (http://www.scirp.org/journal/ijcns/). An Active Rule Approach for Network Intrusion Detection

More information

Analysis of network traffic features for anomaly detection

Analysis of network traffic features for anomaly detection Mach Learn (2015) 101:59 84 DOI 10.1007/s10994-014-5473-9 Analysis of network traffic features for anomaly detection Félix Iglesias Tanja Zseby Received: 9 December 2013 / Accepted: 16 October 2014 / Published

More information

CSE 565 Computer Security Fall 2018

CSE 565 Computer Security Fall 2018 CSE 565 Computer Security Fall 2018 Lecture 19: Intrusion Detection Department of Computer Science and Engineering University at Buffalo 1 Lecture Outline Intruders Intrusion detection host-based network-based

More information

A Combined Anomaly Base Intrusion Detection Using Memetic Algorithm and Bayesian Networks

A Combined Anomaly Base Intrusion Detection Using Memetic Algorithm and Bayesian Networks International Journal of Machine Learning and Computing, Vol. 2, No. 5, October 2012 A Combined Anomaly Base Intrusion Detection Using Memetic Algorithm and Bayesian Networks H. M. Shirazi, A. Namadchian,

More information

A LINEAR GENETIC PROGRAMMING APPROACH TO INTRUSTION DETECTION. Dong Song

A LINEAR GENETIC PROGRAMMING APPROACH TO INTRUSTION DETECTION. Dong Song A LINEAR GENETIC PROGRAMMING APPROACH TO INTRUSTION DETECTION by Dong Song Submitted in partial fulfilment of the requirements for the degree of Master of Computer Science at Dalhousie University Halifax,

More information

Neural Network Weight Selection Using Genetic Algorithms

Neural Network Weight Selection Using Genetic Algorithms Neural Network Weight Selection Using Genetic Algorithms David Montana presented by: Carl Fink, Hongyi Chen, Jack Cheng, Xinglong Li, Bruce Lin, Chongjie Zhang April 12, 2005 1 Neural Networks Neural networks

More information

Feature Selection in UNSW-NB15 and KDDCUP 99 datasets

Feature Selection in UNSW-NB15 and KDDCUP 99 datasets Feature Selection in UNSW-NB15 and KDDCUP 99 datasets JANARTHANAN, Tharmini and ZARGARI, Shahrzad Available from Sheffield Hallam University Research Archive (SHURA) at: http://shura.shu.ac.uk/15662/ This

More information

Regression Test Case Prioritization using Genetic Algorithm

Regression Test Case Prioritization using Genetic Algorithm 9International Journal of Current Trends in Engineering & Research (IJCTER) e-issn 2455 1392 Volume 2 Issue 8, August 2016 pp. 9 16 Scientific Journal Impact Factor : 3.468 http://www.ijcter.com Regression

More information

Evaluating the Strengths and Weaknesses of Mining Audit Data for Automated Models for Intrusion Detection in Tcpdump and Basic Security Module Data

Evaluating the Strengths and Weaknesses of Mining Audit Data for Automated Models for Intrusion Detection in Tcpdump and Basic Security Module Data Journal of Computer Science 8 (10): 1649-1659, 2012 ISSN 1549-3636 2012 Science Publications Evaluating the Strengths and Weaknesses of Mining Audit Data for Automated Models for Intrusion Detection in

More information

Association Rule Mining in Big Data using MapReduce Approach in Hadoop

Association Rule Mining in Big Data using MapReduce Approach in Hadoop GRD Journals Global Research and Development Journal for Engineering International Conference on Innovations in Engineering and Technology (ICIET) - 2016 July 2016 e-issn: 2455-5703 Association Rule Mining

More information

Comparison of variable learning rate and Levenberg-Marquardt back-propagation training algorithms for detecting attacks in Intrusion Detection Systems

Comparison of variable learning rate and Levenberg-Marquardt back-propagation training algorithms for detecting attacks in Intrusion Detection Systems Comparison of variable learning rate and Levenberg-Marquardt back-propagation training algorithms for detecting attacks in Intrusion Detection Systems Tummala Pradeep 1 IV th Year Student, Department of

More information

Approach Using Genetic Algorithm for Intrusion Detection System

Approach Using Genetic Algorithm for Intrusion Detection System Approach Using Genetic Algorithm for Intrusion Detection System 544 Abhijeet Karve Government College of Engineering, Aurangabad, Dr. Babasaheb Ambedkar Marathwada University, Aurangabad, Maharashtra-

More information

Review on Data Mining Techniques for Intrusion Detection System

Review on Data Mining Techniques for Intrusion Detection System Review on Data Mining Techniques for Intrusion Detection System Sandeep D 1, M. S. Chaudhari 2 Research Scholar, Dept. of Computer Science, P.B.C.E, Nagpur, India 1 HoD, Dept. of Computer Science, P.B.C.E,

More information