Abstract

With the rapid growth and usage of internet, number of network attacks have increase dramatically within the past few years. The problem facing in nowadays is to observe these attacks efficiently for security concerns because of the value of data. Consequently, it is important to monitor and handle these attacks and intrusion detection system (IDS) has potentially diagnostic ability to handle these attacks to secure the network. Numerous intrusion detection approaches are presented but the main hindrance is their performance which can be improved by increasing detection rate as well as decreasing false positive rates. Optimizing the performance of IDS is very serious issue and challenging fact that gets more attention from the research community. In this paper, we proposed a hybrid classification approach ‘Intrusion-Miner’ with the help of two classifier algorithm for network anomaly detection to get optimum result and make it possible to detect network attacks. Thus, principal component analysis (PCA) and Fisher Discriminant Ratio (FDR) have been implemented for the feature selection and noise removal. This hybrid approach is compared with J48, Bayesnet, JRip, SMO, IBK and evaluate the performance using KDD99 dataset. Experimental result revealed that the precision of the proposed approach is measured as 96.1 % with low false positive and high false negative rate as compare to other state-of-the-art algorithm. The simulation result evaluation shows that perceptible progress and real-time intrusion detection can be attained as we apply the suggested models to identify diverse kinds of network attacks.

Highlights

  • The networked computer systems are playing a progressive vital role in our society with hastily increasing adoption of internet

  • It is important to monitor and identify these attacks so, it will become traditional to invent a security mechanism. This security mechanism is known as intrusion detection and it is considered as a crucial part of the present security approaches

  • This section is further divided into sub-sections as follows

Read more

Summary

INTRODUCTION

The networked computer systems are playing a progressive vital role in our society with hastily increasing adoption of internet. For a misuse IDS approach, information gathered from traffic analyzed by the IDS to compare it to large database having signatures of already known attacks. These signature attacks are documented by human experts. Network segments are monitored by a detector to stack up against the normal baseline state and inspect for deviations It can detect potentially a wide range of novel attacks [5]. An IDS monitors all ingoing and outgoing activities of network They manage this by collecting information from a number of systems and network resources.

RELATED WORK
PROPOSED APPROACH
Feature Selection
Classification Module
General Form of Proposed Model
Data Set Description
Evaluation Setup
Data Pre-Processing
Classification and Performance Comparison
Discussion on Results
CONCLUSION
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.