Design of Trust Model For Efficient Cyber Attack Detection on Fuzzified Large Data using Data Mining techniques

Similar documents
Optimized Intrusion Detection by CACC Discretization Via Naïve Bayes and K-Means Clustering

ANOMALY-BASED INTRUSION DETECTION THROUGH K- MEANS CLUSTERING AND NAIVES BAYES CLASSIFICATION

Hybrid Feature Selection for Modeling Intrusion Detection Systems

A Network Intrusion Detection System Architecture Based on Snort and. Computational Intelligence

Abnormal Network Traffic Detection Based on Semi-Supervised Machine Learning

Review on Data Mining Techniques for Intrusion Detection System

Network Intrusion Detection Using Fast k-nearest Neighbor Classifier

IJSRD - International Journal for Scientific Research & Development Vol. 2, Issue 06, 2014 ISSN (online):

A Detailed Analysis on NSL-KDD Dataset Using Various Machine Learning Techniques for Intrusion Detection

Enhancing Forecasting Performance of Naïve-Bayes Classifiers with Discretization Techniques

Intrusion Detection System with FGA and MLP Algorithm

CHAPTER V KDD CUP 99 DATASET. With the widespread use of computer networks, the number of attacks has grown

An Intelligent Clustering Algorithm for High Dimensional and Highly Overlapped Photo-Thermal Infrared Imaging Data

Cluster Based detection of Attack IDS using Data Mining

Analysis of Feature Selection Techniques: A Data Mining Approach

CHAPTER 6 MODIFIED FUZZY TECHNIQUES BASED IMAGE SEGMENTATION

Modeling Intrusion Detection Systems With Machine Learning And Selected Attributes

INF4820, Algorithms for AI and NLP: Evaluating Classifiers Clustering

CLASSIFICATION WITH RADIAL BASIS AND PROBABILISTIC NEURAL NETWORKS

An Overview of Data Mining and Anomaly Intrusion Detection System using K-Means

Flow-based Anomaly Intrusion Detection System Using Neural Network

INF4820 Algorithms for AI and NLP. Evaluating Classifiers Clustering

International Journal of Scientific Research & Engineering Trends Volume 4, Issue 6, Nov-Dec-2018, ISSN (Online): X

CHAPTER 5 CONTRIBUTORY ANALYSIS OF NSL-KDD CUP DATA SET

Data Mining Based Online Intrusion Detection

EVALUATIONS OF THE EFFECTIVENESS OF ANOMALY BASED INTRUSION DETECTION SYSTEMS BASED ON AN ADAPTIVE KNN ALGORITHM

Intrusion Detection System Based on K-Star Classifier and Feature Set Reduction

The Comparative Study of Machine Learning Algorithms in Text Data Classification*

Feature Ranking in Intrusion Detection Dataset using Combination of Filtering Methods

A Data Mining Approach for Intrusion Detection System Using Boosted Decision Tree Approach

K-Nearest-Neighbours with a Novel Similarity Measure for Intrusion Detection

ISSN: ISO 9001:2008 Certified International Journal of Engineering and Innovative Technology (IJEIT) Volume 4, Issue 7, January 2015

Detection of DDoS Attack on the Client Side Using Support Vector Machine

Classification Trees with Logistic Regression Functions for Network Based Intrusion Detection System

Anomaly Detection in Communication Networks

Outlier Detection Using Unsupervised and Semi-Supervised Technique on High Dimensional Data

An Ensemble Data Mining Approach for Intrusion Detection in a Computer Network

Intrusion Detection Systems

Evaluation Measures. Sebastian Pölsterl. April 28, Computer Aided Medical Procedures Technische Universität München

An Efficient Decision Tree Model for Classification of Attacks with Feature Selection

Cluster based boosting for high dimensional data

International Journal of Scientific & Engineering Research, Volume 4, Issue 7, July-2013 ISSN

INF4820 Algorithms for AI and NLP. Evaluating Classifiers Clustering

K- Nearest Neighbors(KNN) And Predictive Accuracy

Intrusion Detection Based On Clustering Algorithm

Network Traffic Measurements and Analysis

A study of classification algorithms using Rapidminer

Ensemble of Soft Computing Techniques for Intrusion Detection. Ensemble of Soft Computing Techniques for Intrusion Detection

Best First and Greedy Search Based CFS and Naïve Bayes Algorithms for Hepatitis Diagnosis

International Journal of Computer Engineering and Applications, Volume XI, Issue XII, Dec. 17, ISSN

Intrusion Detection System Using K-SVMeans Clustering Algorithm

Collaborative Security Attack Detection in Software-Defined Vehicular Networks

A Survey And Comparative Analysis Of Data

DDoS Attacks Classification using Numeric Attribute-based Gaussian Naive Bayes

INTRUSION DETECTION WITH TREE-BASED DATA MINING CLASSIFICATION TECHNIQUES BY USING KDD DATASET

CS145: INTRODUCTION TO DATA MINING

A Comparison Between the Silhouette Index and the Davies-Bouldin Index in Labelling IDS Clusters

Feature Selection in the Corrected KDD -dataset

INTRUSION DETECTION SYSTEM USING BIG DATA FRAMEWORK

Application of the Generic Feature Selection Measure in Detection of Web Attacks

Performance Analysis of Data Mining Classification Techniques

Lecture Notes on Critique of 1998 and 1999 DARPA IDS Evaluations

Classification Part 4

Naïve Bayes for text classification

Keywords Intrusion Detection System, Artificial Neural Network, Multi-Layer Perceptron. Apriori algorithm

Intrusion Detection System Using New Ensemble Boosting Approach

Experiments with Applying Artificial Immune System in Network Attack Detection

Improved Classification of Known and Unknown Network Traffic Flows using Semi-Supervised Machine Learning

Global Journal of Engineering Science and Research Management

Noise-based Feature Perturbation as a Selection Method for Microarray Data

Classification Of Attacks In Network Intrusion Detection System

Hybrid Network Intrusion Detection for DoS Attacks

A Comparative Study of Supervised and Unsupervised Learning Schemes for Intrusion Detection. NIS Research Group Reza Sadoddin, Farnaz Gharibian, and

Contents. Preface to the Second Edition

Performance Analysis of various classifiers using Benchmark Datasets in Weka tools

Multiple Classifier Fusion With Cuttlefish Algorithm Based Feature Selection

Object Extraction Using Image Segmentation and Adaptive Constraint Propagation

An Optimized Genetic Algorithm with Classification Approach used for Intrusion Detection

Weka ( )

Data Mining Classification: Alternative Techniques. Imbalanced Class Problem

Preprocessing of Stream Data using Attribute Selection based on Survival of the Fittest

CS4445 Data Mining and Knowledge Discovery in Databases. A Term 2008 Exam 2 October 14, 2008

INTRUSION DETECTION MODEL IN DATA MINING BASED ON ENSEMBLE APPROACH

Hierarchical Adaptive FCM To Detect Attacks Using Layered Approach

NETWORK FAULT DETECTION - A CASE FOR DATA MINING

Feature selection using closeness to centers for network intrusion detection

A STUDY OF SOME DATA MINING CLASSIFICATION TECHNIQUES

Large Scale Data Analysis Using Deep Learning

Cyber Attack Detection and Classification Using Parallel Support Vector Machine

Correlation Based Feature Selection with Irrelevant Feature Removal

Intrusion Detection System based on Support Vector Machine and BN-KDD Data Set

ANOMALY BASED INTRUSION DETECTION IN WLAN USING DISCRIMINATION ALGORITHM COMBINED WITH NAÏVE BAYESIAN CLASSIFIER

Feature Selection for Black Hole Attacks

10/14/2017. Dejan Sarka. Anomaly Detection. Sponsors

Semi-Supervised Clustering with Partial Background Information

Intrusion detection in computer networks through a hybrid approach of data mining and decision trees

On Classification: An Empirical Study of Existing Algorithms Based on Two Kaggle Competitions

CE Advanced Network Security

Selecting Features for Intrusion Detection: A Feature Relevance Analysis on KDD 99 Intrusion Detection Datasets

A study on fuzzy intrusion detection

Transcription:

Design of Trust Model For Efficient Cyber Attack Detection on Fuzzified Large Data using Data Mining techniques Vineet Richhariya, Dr. J.L.Rana,Dr. R.C.Jain,Dr. R.K.Pandey Asst. Professor Director, Director, Director LNCT Bhopal RRIST Bhopal,SATI Bhopal,BU UIT Bhopal Abstract Recently Network Intrusion Detection System (IDS), is being used as the main security defending technique. It is second guard for a network after firewall. Various approaches from data mining to soft computing fields have been used for detecting the misuse and anomaly attacks from the network. A significant challenge in providing an effective defense mechanism to a network perimeter is having the ability to detect intrusions and implement countermeasures. Components of the network perimeter defense capable of detecting intrusions are referred to as Intrusion Detection Systems (IDS). In this paper after studying the research done in the field we proposed a model in which first dimension reduction technique is applied. Secondly on reduced data set fuzzification of feature values is done to get simpler range. Thirdly combination of clustering and naïve based approach,on the large test dataset applied. Obtained results are analyzed on detection rate, False positive rate and precision rate. Fuzzy logic based discretization of the dataset has helped to improve the training data representation, and performs well in terms of detecting attacks faster and with reasonable reduction in false alarm rate. Index Terms Intrusion Detection System, Fuzzy discretization, False alarm rate, dimension reduction, Clustering, Classification. I. INTRODUCTION Despite the Web s great success as a technology and the significant amount of computing infrastructure on which it is built, it is very crucial when security issues are considers. A significant challenge in providing an effective defense mechanism to a network perimeter is having the ability to detect intrusions and implement countermeasures. Components of the network perimeter defense capable of detecting intrusions are referred to as Intrusion Detection Systems (IDS). Intrusion detection techniques have been investigated since the mid 80 s and, depending on the type and source of the information used to identify security breaches; they are classified as host based or network based. [1] Host based system uses local host information such as process behavior; file integrity and system log file to detect events. Network based systems use network activity of various users to perform the analysis. Combinations of these two types are also possible. Depending on how the intrusion is detected, an IDS is further classified as signature based (also known as misuse system) or anomaly based. Signature based systems attempt to match observed activities against well defined existing patterns, also called signatures. Anomaly based systems look for any evidence of activities that deviate from what is considered normal system use. These systems are capable of detecting attacks for which a well defined pattern does not exist (such as a new attack or a variation of an existing attack). A hybrid IDS is capable of using signatures and detecting anomalies.[2] The present paper introduces an adaptive approach for intrusion detection. The normal system activity is described using data mining techniques, namely Naïve Bayes and K- Means clustering. The intrusion behavior detection is optimized by application of fuzzy logic in discretization of large data set. The rest of this paper is organized as follows. In section II, we discuss the related research works; in section III we give our proposed architecture, methodology and experimental setup and evaluates explains in section IV. Finally, section V discusses our conclusion and future work. II. RELATED WORK Data mining is the latest technology introduced in network security environment to find regularities and irregularities in large datasets [3]. ADAM (Audit Data Analysis and Mining) [4] is an intrusion detector built to detect intrusions using data mining techniques. It first absorbs training data known to be free of attacks. IDDM [5] and MADAM ID (Mining Audit Data for Automated Models for Intrusion Detection) [6] is one of the best known data mining projects in intrusion detection. In [7] Authors discuss Different classifiers can be used to form a hybrid learning approaches such as combination of clustering and classification technique. Researchers in [8] apply Clustering that is an anomaly-based detection method that is able to detect novel attack without any prior notice and is capable to find natural grouping of data based on similarities among the patterns. In [9] Authors use K-Means and DB-Scan to efficiently identify a group of traffic behaviors that are similar to each other using cluster analysis. Researchers in [10] discusses that Naïve Bayes classifiers provide a very competitive result, although it has a simple structure. Naïve Bayes are more efficient in classification task. Naïve Bayes classifier for anomaly-based network intrusion detection has proposed in [11]. He demonstrates that Naïve Bayes classifier more efficient in detecting network intrusion compare to neural network. A comprehensive set of classifiers evaluated for detecting four type of attacks category which using KDD dataset [12]. www.ijrcct.org chiefeditor@ijrcct.org Page 126

In this The best classifier for each attack category has been chosen and two appropriate classifier proposed for their selection models. Reference [13] proposed the best performed classifier for each category of attack by evaluates a comprehensive set of different classifier using the data collected from Knowledge Discovery Database (KDD). Also for dataset discretization class-attribute interdependence maximization algorithm is proposed by Authors [14]. A new Discretization algorithm based on difference-similitude set theory (DSST) is presented in [15]. All this approaches has improved in classification tasks. It is different from the known algorithms because the reduction in the information system is prior to the data discretization. III. PROPOSED ARCHITECTURE OF TRUST MODEL Signature based learning approaches are able to detect attacks with high accuracy and to achieve high detection rates. In order to maintain the high accuracy and detection rate while at the same time to lower down the false alarm rate, we proposed a trust model which in first stage reduced the data set by identifying relevant feature using information gain method, then transform it into a smoother dataset having low range vaules of different attributes, using fuzzy logic. In the second stage the proposed hybrid learning approach, we grouped similar data instances based on their behaviors by utilizing a K-Means clustering as a pre-classification component. Next, using Naïve Bayes classifier we classified the resulting clusters into attack classes as a final classification task. We found that data that has been misclassified during the earlier stage may be correctly classified in the subsequent classification stage. A. Database Discretization The task of extracting knowledge from databases is quite often performed by machine learning algorithms. The majority of these algorithms can be applied only to data described by discrete numerical or nominal attributes (features). In the case of continuous attributes, there is a need for a discretization approach[16] that transforms continuous attributes into discrete ones. Approach of Fuzzy logic is used for this purpose. FBCAIM ( Fuzzy Basedclass-attribute interdependence maximization). Input: Dataset with i continuous attributes, M examples and S target classes; 1. Begin; 2. For each continuous attribute Ai 3. Find the maximum d n and the minimum d 0 values of Ai; 4. Form a set of all distinct values of A in ascending order; 5. Initialize all possible interval boundaries B with the minimum and maximum. 6. Calculate the midpoints of all the adjacent pairs in the set; 7. Set the initial discretization scheme as D: {[d 0, d n ]}; 8. Initialize k = 1; 9. For each feature divide its range (d 0, d n) boundary into five equally distributed subrange; 10. Take each feature and until the last one and observe it value as per fuzzy rules specified; 11. Calculate the corresponding class label value and class merit value in which the feature value belongs; 12. Use threshold value in deciding the merit of each feature value and assign a class merit value using fuzzy trapelized function; 13. k = k + 1; 14. Goto Line 10; 15. Output the Discretized transformed scheme D with k intervals for continuous attribute Ai; for i=1 to n; 16. End B. K-Means Clustering Our approach first deploys the K-mean clustering algorithm in order to separate time intervals with normal and anomalous traffic in the training dataset. Figure 1 show the steps involved in K-Means clustering process. [17] The main goal to utilize K-Means clustering approach is to split and to group data into normal and attack instances. K- Means clustering methods partition the input dataset into k- clusters according to an initial value known as the seedpoints into each cluster s centroids or cluster centers. The mean value of numerical data contained within each cluster is called centroids. In our case, we choose k = 3 in order to cluster the data into three clusters (C1, C2, C3). Since U2R and R2L attack patterns are naturally quite similar with normal instances, one extra cluster is used to group U2R and R2L attacks. The K-Means algorithm works as follows: Select initial centers of the K clusters. Repeat step 2 through 3 until the cluster membership stabilizes. Generate a new partition by assigning each data to its closest cluster centers. Compute new clusters as the centroids of the clusters. A distance function is used in order to compute the distance (i.e. similarity) between two objects. The most commonly used distance function is the Euclidean [17] one which is defined as: d(x,y) = 2.(1) In Eqn. (1); X = (x 1 x m ) and Y = (y 1 y m ) are two input vectors with m quantitative features. In the Euclidean distance function, all features contribute equally to the function value. C. Naïve Bayes Classifier Some behaviors in intrusion instances are similar to normal and other intrusion instances as well. In addition, a lot of algorithms including K-Means are unable to correctly distinguish intrusion instances and normal instances. In order to improve this limitation of classification, we combined K-Means technique with Naïve Bayes classifier. www.ijrcct.org chiefeditor@ijrcct.org Page 127

Naïve Bayes has become one of the most efficient learning algorithms [18]. Naïve Bayes are based on a very strong independence assumption with fairly simple construction. It analyzes the relationship between independent variable and the dependent variable to derive a conditional probability for each relationship. As per Bayes Theorem we write: P (H X) = P (X H) P (H) / P(X).(2) In Eqn. (2) X is the data record and H is some hypothesis represent data record X, which belongs to a specified class C. For classification, we would like to determine P(H X), which is the probability that the hypothesis H holds, given an observed data record X. P(H X) is the posterior probability of H conditioned on X. In contrast, P(H) is the prior probability. The posterior probability P(H X), is based on more information such as background knowledge than the prior probability P(H), which is independent of X. Similarly, P(X H) is posterior probability of X conditioned on H. For detecting intrusions Naïve Bayes is effective, we calculate prior probabilities and on that basis we calculate the posterior probability. Naïve Bayes algorithm determine the class by taking maximum probabilities. IV. EXPERIMENTAL EVALUATION A. Dataset Description Many Researchers use, the KDD Cup 99 benchmark dataset [19] for evaluation and comparison between the proposed approaches and the previous approaches. The entire KDD data set contains an approximately 500,000 instances with 41 features. The training dataset contains 24 types of attack, while the testing data contains more than 14 types of additional attack. KDD dataset covered four major categories of attacks which is Probe, DoS, R2L and U2R. In order to demonstrate the abilities to detect different kinds of intrusions, the training and testing data covered all classes of intrusion categories as listed in the following as adopted from the [18]. B. Feature Selection The number of features required is another major concern in processing the dataset as well. The primary benefit of feature selection is that the amount of data required to process is reduced, ideally without compromising the performance of the detector. In some cases, feature selection may improve the performance of the detector as it simplifies the complexity problem by reducing its dimensionality. Through information Gain based feature reduction approach 14 most relevant features are selected. These 14 features are best suitable for particular attack type from all 41 features of KDD dataset. These features are mentioned as below: TABLE I. Selected Features for IDS feature position feature name 3 service 6 destination bytes 10 Hot 12 logged in 14 root shell 22 is guest login 23 Count 24 srv_count 29 same_srv_rate 35 dst_host_diff_srv_rate 36 dst_host_same_src_port_rate 37 dst_host_srv_diff_host_rate 40 dst_host_rerror_rate C. Evaluation Measurement An Intrusion Detection System (IDS) requires high accuracy and detection rate as well as low false alarm rate. In general, the performance of IDS is evaluated in term of KDD data set with attribute and class labels Relevent Feature Selection Apply Fuzzy Logic based discretization on dataset check the similarity of examples: sim(ti, tl) Put examples into cluster: Di ti For each cluster Di, calculate the prior probabilities P(Cj) and conditional Probabilities: P(Aij Cj) Determine the class label of each tuple from test data set based on haiving its P(Cj). P(Aij Cj) Value Fig. 1. NIDS process flow accuracy, detection rate, and false alarm rate using the following formula: Accuracy= (TP+TN) / (TP+TN+FP+FN)..(3) Detection Rate = (TP) / (TP+FP).(4) www.ijrcct.org chiefeditor@ijrcct.org Page 128

False alarm = (FP) / (FP+TN).(5) Table II shows the categories of data behavior in intrusion detection for binary category classes (Normal and Attacks) in term of true negative, true positive, false positive and false negative. [16] TABLE II.GENRAL BEHAVIOUR OF INTRUSION DETECTION DATA Predicted Normal Normal TN FP Attack FN TP Predicted Attack True positive (TP) when attack data detected as attack True negative (TN) when normal data detected as normal False positive (FP) when normal data detected as attack Detectio n Rate False positiv e Norma 97.58 7.25 92.70 75.98 92.71 l DoS 99.50 1.41 94.54 74.44 95.54 Probe 64.02 5.03 91.30 8.62 94.3 U2R 90 0.26 58.69 2.36 98.10 R2L 79.54 0.80 36.45 3.04 94.25 False negative (FN) when attack data detected as normal D. Results and discussion Recal l Preci sion Accur acy Table III, IV, V and VI represent the results of classification obtained from Naïve Bayes (NB) and proposed hybrid learning approach K-Means with Naïve Bayes (KM+NB ) using the training and testing sets. KM+NB performed better than the single classifier NB in detecting Normal and attack instances. Since Normal, U2R, and R2L instances are similar to each other, KM+NB recorded a comparable result for R2L instances except for U2R instances. TABLE III Confusion matrix on 14 features set with single Naïve Bayes Normal DoS Probe U2R R2L Normal 1113 16 59 3 9 DoS 187 3424 70 0 0 Probe 10 35 105 0 0 U2R 19 1 2 27 0 R2L 61 0 1 3 35 TABLE IV Confusion matrix on 14 features set with KM+ Naïve Bayes Normal DoS Probe U2R R2L Normal 1104 0 2 88 6 DoS 79 3415 0 6 0 Probe 0 0 149 1 0 U2R 0 0 5 45 0 R2L 2 0 3 5 90 TABLE V Performance measurement on discretized 14 features set with Naïve Bayes Table V &VI shows the measurement in terms of Precision, Accuracy Recall, detection rate, and false alarm using the training and testing sets on both single classifiers and hybrid learning approach. We can see that single classifier produced a slightly higher accuracy and detection rate in case of Normal, Probe and U2R class type with less false alarm rates as well. Meanwhile, the hybrid approach recorded high accuracy and detection rate with low false alarm percentage for DoS and R2L class type. A subset of KDDCUP99 is used for fuzzificztion and after transforming it helped the proposed hybrid learning approach to produce better results as compared to results obtained with Full feature set. The hybrid approach also allows misclassified data during the first stage to be classified again, hence improving the accuracy and detection rate with acceptable false alarm. V. CONCLUSION AND FEATURE WORK In this paper, after irrelevant feature elimination from large dataset i.e. KDD99CUP for network analysis in terms of attack classification, We have fuzzified the relevant attributes and then a hybrid learning approach through K- Means clustering and Naïve Bayes classifier is applied. Application of fuzzy logic for transforming the large, varied attributes value in the smaller one, has minimized the training time and produce better classification results This proposed mechanism has proposed efficient results on various measurement parameters of the field,whwn compared with exiting results. The approach was compared and evaluated using KDD Cup 99 benchmark dataset. The fundamental solution is to separate instances between the potential attacks and the normal instances during a preliminary stage into different clusters. In the future, we recommend considering the Hybrid Intrusion Detection approaches which is better at detecting various attacks type. Other feature reduction techniques can also be applied to see the effectiveness of the proposed mechanism. TABLE VI Performance measurement on discretized 14 features set with KM+ Naïve Bayes Detection Rate False positive Recall Precision Accuracy Normal 98.46 4.91 99.78 76.87 98.66 DoS 99.94 0.17 100 75.28 99.95 Probe 90.90 1.29 100 11.61 98.85 U2R 91.66 0.34 88 3.7 99.16 R2L 71.64 3.22 97.95 7.7 96.86 REFERENCES [1] W. Lee, J. S. Stolfo, and W. K. Mok, "A Data mining framework for adaptive intrusion detection," Proceedings of the 1999 leee Symposium on Security and Privacy, pp.120-132, 1999. [2] Patcha and J-M Park, An overview of anomaly detection techniques: Existing solutions and latest technological trends, Computer Network, 2007. [3] Solahuddin, Applying knowledge discovery in database techniques in modeling packet header anomaly intrusion detection systems, Journal of Software, 2008, 3(9): 68-76. www.ijrcct.org chiefeditor@ijrcct.org Page 129

[4] D.Barbara, J.Couto, SJajodia, and N.Wu, "ADAM: A test bed for exploring the use of data mining in intrusion detection", SIGMOD, vo130, no.4, pp 15-24,2001. [5] Tomas Abraham, "IDDM: INTRUSION Detection using Data Mining Techniques", Technical report DSTO electronics and surveillance research laboratory, Salisbury, Australia, May2001. [6] Wenke Lee and Salvatore J.Stolfo, "A Framework for constructing features and models for intrusion detection systems" ACM transactions on Information and system security (TiSSEC), vol.3, Issue 4, Nov 2000. [7] C. F. Tsai, and C.Y Lin, A triangle area-based nearest neighbors approach to intrusion detection, Pattern Recognition, 2010, 43(1):222-229. [8] Y. Li and L. Guo, An active learning based on TCM-KNN algorithm for supervised network intrusion, Computer and Securtiy, 2007, 26: 459-467. [9] R. Luigi, T.E. Anderson, and N. McKeown, Traffic classification using clustering algorithms. In Proceedings of the ACM SIGCOMM Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, Sept. 2011, Pisa, Italy, ACM Press, pp. 281-286. [10] B.A. Nahla, B. Salem, and E. Zied, Naive bayes vs decision trees in intrusion detection systems. In Proceeding of the ACM Symposium on Applied Computing, Nicosia, Cyprus, 2004. [11] P. Mrutyunjaya, and R. P. Manas, Network intrusion detection Using naïve bayes, International Journal of Computer Science and Network Security, 2007, 7(12):258-263. [12] N. H. Anh, and C. Deokjai, Application of data mining to network intrusion detection: classifier selection model, Lecture Notes in Computer Science. 2008, 5297:399-408. [13] G. Meera and S. K. Srivatsa, Classification algorithms in comparing classifier categories to predict the accuracy of the network intrusion detection a machine learning approach, Advances in Computational Sciences and Technology. 2010, (3):321 334. [14] Kurgan, L.A, Cois K J, CAIM Discretization Algorithm Knowladge and Data Engg. Volume:2, Issue:6, 2004. [15] Ming wau, Zayo chun Hang Discretization algorithm based on Difference-similitude set theory" Machine Learning and cybernatics. 2005. [16] Cheng-Jung Tsai, Chien-I. Lee, Wei-Pang Yang, A discretization algorithm based on Class-Attribute Contingency Coefficient Information Sciences 178, year- 2008. [17] Pradeep Rai,Shuba Singh. A Survey of Clustering Techniques. International Journal of Computer Applications (0975-8887) Volume 7- No.12.October 2010. [18]H. Zhang and J. Su., Naive bayes for optimal ranking, Journal of Experimental and Theoretical Artificial Intelligence. 2008, 20: 79-93. [19] KDD.(1999). Available at http://kdd.ics.uci.edu/databases/ - kddcup99/kddcup99.html. [20] An Adaptive Hybrid Intrusion Detection System By Mahbod Tavallaee, THE UNIVERSITY OF NEW BRUNSWICK October, 2011. www.ijrcct.org chiefeditor@ijrcct.org Page 130