Most Read Research Articles


Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79
Call for Paper - May 2015 Edition
IJCA solicits original research papers for the May 2015 Edition. Last date of manuscript submission is April 20, 2015. Read More

Development and Assessment of Intrusion Detection System using Machine Learning Algorithm

Print
PDF
IJCA Special Issue on Issues and Challenges in Networking, Intelligence and Computing Technologies
© 2012 by IJCA Journal
ICNICT - Number 6
Year of Publication: 2012
Authors:
Vinod Kumar
Om Prakash Sangwan

Vinod Kumar and Om Prakash Sangwan. Article: Development and Assessment of Intrusion Detection System using Machine Learning Algorithm. IJCA Special Issue on Issues and Challenges in Networking, Intelligence and Computing Technologies ICNICT(6):33-36, November 2012. Full text available. BibTeX

@article{key:article,
	author = {Vinod Kumar and Om Prakash Sangwan},
	title = {Article: Development and Assessment of Intrusion Detection System using Machine Learning Algorithm},
	journal = {IJCA Special Issue on Issues and Challenges in Networking, Intelligence and Computing Technologies},
	year = {2012},
	volume = {ICNICT},
	number = {6},
	pages = {33-36},
	month = {November},
	note = {Full text available}
}

Abstract

In today's world, the internet is an important part of our life. People cannot think of a single moment without the existence of the internet. With the increasing involvement of the internet in our daily life, it is very important to make it secure. Now to make communication system more secure there is a need of Intrusion Detection Systems which can be roughly classified as anomaly-based detection systems and signature-based detection systems. In the paper we presents a simple and robust method for intrusion detection in computer networks based on Principal Component Analysis (PCA) where each network connection is transformed into an input data vector. PCA is used to reduce the high dimensional data vector to low dimensional data vector and then detection is done in less dimensional space with high efficiency and low use of system resources. We have used KDD Cup 99 dataset for experiment and result shown that this approach is promising in terms of detection accuracy. It is also effective to identify most known attacks as well as new attacks. However, a frequent update for both user profiles and attacks databases is crucial to improve the identification rates.

References

  • D. E. Denning. 1987. An Intrusion-Detection Model. IEEE transactions on software engineering, Volume : 13 Issue: 2.
  • Emmanuel Hooper. 2007. An Intelligent Intrusion Detection and Response System Using Hybrid Ward Hierarchical Clustering Analysis, International Conference on Multimedia and Ubiquitous Engineering, in IEEE, 1187-1192.
  • Guan Xin and Li Yun-jie. 2010. A new Intrusion Prevention Attack System Model based on Immune Principle, International Conference on e-Business and Information System Security (EBISS), in IEEE, 1-4.
  • I. T. Jolliffe. 2002. Principal Component Analysis, 2nd Edition,Springer-Verlag, NY.
  • J. P. Anderson. 1972. Computer security technology planning study. Technical Report, ESDTR-73-51, United States Air Force, Electronic Systems Division.
  • J. P. Anderson. 1980. Computer Security Threat Monitoring and Surveillance. Technical Report, James P. Anderson Company, Fort Washington, Pennsylvania.
  • Jonathon Shlens. 2009. A Tutorial on Principal Component Analysis. Version 3. 01.
  • R Rangadurai Karthick, Vipul P. Hattiwale and Balaraman Ravindran, 2012. Science Adaptive Network Intrusion Detection System using a Hybrid Approach, Fourth International Conference on Communication Systems and Networks (COMSNETS), in IEEE, pp. 1-7.
  • Ronald L. Krutz, and Russell Dean Vines. 2010. Cloud Security: A Comprehensive Guide To Secure Cloud Computing, e-book published by Wiley Publishing, Inc. , pp. 61-169.
  • Sodiya, A and Akinwale, A. 2004. A new two - tiered strategy to intrusion detection. Information Management and Computer Security, Volume: 12 Issue: 1, 27-44.
  • The third international knowledge discovery and data mining tools competition dataset (1999), "KDD99-Cup", available: http://kdi. ics. uci. edu/databases/kddcup99/kddcup99. html
  • V. Paxson. 1988. Bro: A system for detecting network intruders in real-time, In Proceedings of the 7th USENIX Security Symposium, San Antonio, TX.
  • W. Lee, S. J. Stolfo, and K. Mok. 1999. Data mining in work flow environments: Experiences in intrusion detection, In Proceedings of the 1999 Conference on Knowledge Discovery and Data Mining (KDD-99).
  • Zhou, J. , Carlson, A and Bishop, M. 2005. Verify Results of Network Intrusion Alerts Using Lightweight Protocol Analysis, Proceedings of the 21st Annual Computer Security and Applications Conference (ACSAC ).