Detection of novel attacks by anomaly intrusion detection system using classifiers

  • Authors

    • P. M. Abhinaya
    • V. Nivethitha
    https://doi.org/10.14419/ijet.v7i1.7.9571

    Received date: February 17, 2018

    Accepted date: February 17, 2018

    Published date: February 5, 2018

  • Information Gain Selection, Kstar, Bayesian, Bayes Net, Classification, IBK, Naïve Bayes, Lazy.
  • Abstract

    Nowadays analyzing unsuspicious network traffic has become a necessity to protect organizations from intruders. Really it is a big challenge to accurately identify threats due to the high volume of network traffic. In the existing system, to detect whether network traffic is normal or abnormal we need lots of information about the network. When lot of information is involved in the identification process the relationship between different attributes and the important attributes consider for classification plays an important role in the accuracy. Information gain selection process is used to provide a rank for features. Based on the rank, the most contributed features in the network is found and used to improve the detection rate based on the features selection. In this project, the performance of Lazy and Bayesian classifiers is analysed. In lazy classifier comes there are some algorithms namely, IBK and Kstar. Bayesian classifier comes there are some algorithms namely, Bayes Net, and Naïve Bayes. The performances of Bayesian and lazy classifiers are analysed by applying various performance metrics to identify the best classifier. It is observed that, the efficiency of lazy classifier is better as compared to that of Bayesian classifier.

  • References

    1. SY Ji, BK Jeong, S Choi and DH Jeong, “A multi-level intrusion detection method for abnormal network behaviors” ELSEVIER: Journal of Network and Computer Applications, vol.62, pp.9-17, 2016. https://doi.org/10.1016/j.jnca.2015.12.004.
    2. Huang L, Milne D, Frank E, Witten IH, “Learning a concept‐based document similarity measure”, Journal of the Association for Infor-mation Science and Technology, pp.1593-608, 2012. https://doi.org/10.1002/asi.22689.
    3. Vaithiyanathan V, Rajeswari K, Kapil Tajane and Rahul Pitale, “Comparison of different classification techniques using different datasets”, International Journal of Advances in Engineering & Technology, May 2013.
    4. Sharma TC, Jain M, “WEKA approach for comparative study of classification algorithm”, International Journal of Advanced Re-search in Computer and Communication Engineering. April 2013.
    5. Amor NB, Benferhat S, Elouedi Z, “Naive bayes vs decision trees in intrusion detection systems”, ACM symposium on applied com-puting, vol.14, pp. 420-424, March 2013.
    6. S. Durai , N. Rajkumar, N. K. Manikandan and D. Manivannan “Data Entry Works in computer using Voice Keyboard” , Indian Journal of Science and Technology, Vol 9 (2), January 2016 http://nsl.cs.unb.ca/NSL-KDD/. https://doi.org/10.17485/ijst/2016/v9i2/85814.
    7. Aljawarneh S, Aldwairi M, Yassein MB,”Anomaly-based intrusion detection system through feature selection analysis and building hybrid efficient model”, Journal of Computational Science, March 2017. https://doi.org/10.1016/j.jocs.2017.03.006.
    8. Garcia-Teodoro P, Diaz-Verdejo J, Maciá-Fernández G, Vázquez E,“Anomaly-based network intrusion detection: Techniques”, sys-tems and challenges. Computers & security, pp.18-28, March 2009. https://doi.org/10.1016/j.cose.2008.08.003.
    9. Alaei P, Noorbehbahani F, “Incremental anomaly-based intrusion detection system using limited labeled data”, IEEE: International Conference, pp. 178-184, April 2017. https://doi.org/10.1109/ICWR.2017.7959324.
    10. Van NT, Thinh TN, Sach LT, “An anomaly-based network intrusion detection system using Deep learning. InSystem Science and Engi-neering”, IEEE International Conference pp. 210-214, July 2017.
  • Downloads

  • How to Cite

    Abhinaya, P. M., & Nivethitha, V. (2018). Detection of novel attacks by anomaly intrusion detection system using classifiers. International Journal of Engineering and Technology, 7(1.7), 54-58. https://doi.org/10.14419/ijet.v7i1.7.9571