Home            Contact us            FAQs
    
      Journal Home      |      Aim & Scope     |     Author(s) Information      |      Editorial Board      |      MSP Download Statistics

     Research Journal of Applied Sciences, Engineering and Technology


An Adaptive Hybrid Multi-level Intelligent Intrusion Detection System for Network Security

P. Ananthi and P. Balasubramanie
Kongu Engineering College, India
Research Journal of Applied Sciences, Engineering and Technology  2014  16:3348-3355
http://dx.doi.org/10.19026/rjaset.7.680  |  © The Author(s) 2014
Received: October 03, 2013  |  Accepted: November 21, 2013  |  Published: April 25, 2014

Abstract

Intrusion Detection System (IDS) plays a vital factor in providing security to the networks through detecting malicious activities. Due to the extensive advancements in the computer networking, IDS has become an active area of research to determine various types of attacks in the networks. A large number of intrusion detection approaches are available in the literature using several traditional statistical and data mining approaches. Data mining techniques in IDS observed to provide significant results. Data mining approaches for misuse and anomaly-based intrusion detection generally include supervised, unsupervised and outlier approaches. It is important that the efficiency and potential of IDS be updated based on the criteria of new attacks. This study proposes a novel Adaptive Hybrid Multi-level Intelligent IDS (AHMIIDS) system which is the combined version of anomaly and misuse detection techniques. The anomaly detection is based on Bayesian Networks and then the misuse detection is performed using Adaptive Neuro Fuzzy Inference System (ANFIS). The outputs of both anomaly detection and misuse detection modules are applied to Decision Table Majority (DTM) to perform the final decision making. A rule-base approach is used in this system. It is observed from the results that the proposed AHMIIDS performs better than other conventional hybrid IDS.

Keywords:

Adaptive neuro fuzzy inference system, classifier, decision table majority, intrusion detection system,


References

  1. Anderson, J., 1995. An Introduction to Neural Networks. MIT Press, Cambridge.
  2. Bhavani Sankar, A., D. Kumar and K. Seethalakshmi, 2012. A new self-adaptive neuro fuzzy inference system for the removal of non-linear artifacts from the respiratory signal. J. Comput. Sci., 8(5): 621-631.
    CrossRef    
  3. Daniel, B., C. Julia, J. Sushil and W. Ningning, 2001. Adam: A testbed for exploring the use of data mining in intrusion detection. ACM SIGMOD Record, 30: 15-24.
    CrossRef    
  4. Depren, O., M. Topallar, E. Narim and M.K. Ciliz, 2005. An intelligent Intrusion Detection System (IDS) for anomaly and misuse detection in computer networks. Expert Syst. Appl., 29(4): 713-722.
    CrossRef    
  5. Jie Yang, X.C., X. Xudong and W. Jianxiong, 2010. HIDS-DT: An effective hybrid intrusion detection system based on decision tree. Proceeding of the International Conference on Communications and Mobile Computing (CMC), 1: 70-75.
    CrossRef    
  6. John, M., C. Alan and A. Julia, 2000. Defending yourself: The role of intrusion detection systems. IEEE Software, 17(5): 42-51.
    CrossRef    
  7. Kemmerer, R.A. and G. Vigna, 2002. Intrusion detection a brief history and overview. Computer, 35(4): 27-30.
    CrossRef    
  8. Kohavi, R., 1995. The Power of Decision Tables. Proceedings of European Conference on Machine Learning. LNAI 914, Springer-Verlag, pp: 174-189.
    CrossRef    
  9. Kohavi, R. and D. Sommerfield, 1998. Targeting business users with decision table classifier. Proceeding of 4th International Conference on Knowledge Discovery and Data Mining, pp: 249-253.
  10. Lichodzijewski, P., A. Zincir-Heywood and M. Heywood, 2002. Host-based intrusion detection using self-organizing maps. Proceedings of the IEEE International Jiont Conference on Neural Networks (IJCNN, 2002). Honolulu, HI.
    CrossRef    
  11. Mukkamala, S., A.H. Sung and A. Abraham, 2003. Intrusion detection using ensemble of soft computing paradigms. Proceeding of the 3rd International Conference on Intelligent Systems Design and Applications. Tulsa, USA, pp: 239e48.
    CrossRef    
  12. Mukkamala, S., A.H. Sung and A. Abraham, 2004a. Modeling intrusion detection systems using linear genetic programming approach. Proceeding of the 17th International Conference on Industrial and Engineering Applications of Artificial Intelligence and Expert Systems (IEA/AIE). Ottawa, Canada, pp: 633e42.
    CrossRef    
  13. Mukkamala, S., A.H. Sung, A. Abraham and V. Ramos, 2004b. Intrusion detection systems using adaptive regression splines. In: Seruca, I., J. Filipe, S. Hammoudi and J. Cordeiro (Eds.), Proceeding of the 6th International Conference on Enterprise Information Systems (ICEIS'04). Portugal, 3: 26e33.
  14. Om, H. and A. Kundu, 2012. A hybrid system for reducing the false alarm rate of anomaly intrusion detection system. Proceeding of the 1st International Conference on Recent Advances in Information Technology (RAIT).
    CrossRef    
  15. Pfahringer, B., 1995. Compression-based feature subset selection. Proceedings of the IJCAI-95 Workshop on Data Engineering for Inductive Learning. Morgan Kaufmann Publishers, Montreal, Quebec, Canada, San Francisco, CA, USA, pp: 109-119.
  16. Portnoy, L., E. Eskin and S.J. Stolfo, 2001. Intrusion detection with unlabeled data using clustering. Proceeding of the ACM CSS workshop DMSA-2001, Philadelphia, PA, November 8, pp: 5-8.
  17. Shah, K., N. Dave, S. Chavan, S. Mukherjee, A. Abraham and S. Sanyal, 2004. Adaptive neuro-fuzzy intrusion detection systems. Proceeding of the IEEE International Conference on Information Technology: Coding and Computing (ITCC'04), pp: 70-74.
  18. Summers, R.C., 1997. Secure Computing: Threats and Safeguards. McGraw-Hill, New York.
  19. Tiwari, P., 2002. Intrusion detection technical report. Department of Electrical Engineering Indian Institute of Technology, Delhi.
  20. Xiaorong, C. and W. Shanshan, 2010. A real-time hybrid intrusion detection system based on principle component analysis and self organizing maps. Proceeding of the 6th International Conference on Natural Computation (ICNC), 3: 1182-1185.
  21. Yu-Xin, D.M.X. and L. Ai-Wu, 2009. Research and implementation on snort-based hybrid intrusion detection system. Proceeding of the International Conference on Machine Learning and Cybernetics, 3: 1414-1418.
  22. Zahra, A.O., M. Ezzat, H.N. Ahmad, A.A. Amir Azimi and M. Mir Kamal, 2012. Using adaptive neuro-fuzzy inference system in alert management of intrusion detection systems. Int. J. Comput. Netw. Inform. Secur., 11: 32-38.

Competing interests

The authors have no competing interests.

Open Access Policy

This article is distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.

Copyright

The authors have no competing interests.

ISSN (Online):  2040-7467
ISSN (Print):   2040-7459
Submit Manuscript
   Information
   Sales & Services
Home   |  Contact us   |  About us   |  Privacy Policy
Copyright © 2024. MAXWELL Scientific Publication Corp., All rights reserved