Abstract

Intrusion detection system is a significant security mechanism that monitors network traffic to assist prevents unwanted access to network resources. Effective intrusion detection is an important issue for defending networks against potential intrusions. In this paper, a new intrusion detection strategy is proposed. The recommended intrusion detection strategy is divided into three steps: (i) Preparing step, (ii) Feature selection step, and (iii) Classification step. Preparing step gathers and analyzes network traffic in readiness for training and testing. Feature selection step aims to choose the significant features for detecting intrusion attacks form preparing step. It comprises of two successive feature selection modules, which are; quick selection module and precise selection module. Precise selection module deploys genetic algorithm as a wrapper method, whereas quick selection module relies on filter. Based on the most effective features identified by feature selection step, the classification step seeks to detect intrusion attacks with the least amount of time penalty. It contains two phases: prioritized naive bayes phase and distance encouragement phase, which avoids the problems of naive bayes classifiers. The presented intrusion detection strategy beats other previous approaches using the NSL-KDD dataset, according to the experimental tests. Intrusion detection strategy provides the highest accuracy, precision, recall and F1-measure with values equal to 97.6%, 98.24%, 98.14%, and 98.11% respectively with minimum time penalty.

Highlights

  • UNAUTHORIZED attacks on computers and networks are detected using an intrusion detection system [1,2]

  • This study introduces an effective Intrusion Detection Strategy (IDS) for identifying intrusion attacks

  • IDS is divided in three steps, as follow: Preparing Step (PS), Feature Selection Step (FSS), and Classification Step (CS)

Read more

Summary

INTRODUCTION

UNAUTHORIZED attacks on computers and networks are detected using an intrusion detection system [1,2]. During FSS, the most significant features for detecting intrusion attacks form PS has been selected by employing a proposed a Combined Feature Selection Methodology (CFSM). Filter techniques can give quick selection, but they lack accuracy since; feature dependencies are ignored, and the judgment must be made just once Wrapper techniques, such as GA, can mitigate for filter method flaws by providing precise selection by taking into account feature relationships and the connection with the deployed classifier. CFSM is able to pick the effective features because it evolves filter techniques for quick selection, wrapper methods to provide precise selection, and it take into account feature correlations and connections with the classifier. The CS employs a novel classification technique to provide quick and precise intrusion detection depending on the features picked. The paper is organized as follows: In Sect.

RELATED WORK
20: End If
EXPERIMENTAL RESULTS
Dataset Description
CONCLUSIONS
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call