Open Access Open Access  Restricted Access Subscription or Fee Access

An Intelligent Intrusion Detection Model for MANET’s based on Hybrid Feature Selection

S. Ganapathy, K. Rajesh Kambattan, N. Veerapandian, M. Pasupathy

Abstract


Intrusion Detection Systems (IDS) use different data reduction techniques. These techniques influence to improve the performance of the system through detect the attackers. At the same time the existing techniques posses slow training and testing process and are more expensive as well. Moreover, the false alarm rate in such system is high. Therefore, preprocessing is an important issue in Intrusion Detection System. In this paper, we propose a new hybrid attribute selection technique based on Extended Chi-square and Enhanced Multiclass Support Vector Machine (EMSVM) algorithm to build an Intrusion Detection System. Verification tests have been carried out by using the KDD’99 Cup Dataset. From the experiments, it is observed that significant improvement has been achieved from the viewpoint of both high detection and low false alarm rate.


Keywords


Intrusion Detection System (IDS), Enhanced Multiclass Support Vector Machine (EMSVM), Feature Selection

Full Text:

PDF

References


Dai Hong, Li Haibo, “ A Lightweight Network Intrusion Detection Model based on Feature Selection”, 15th IEEE Pacific Rim International Symposium on Dependable Computing, pp. 165-168, 2009.

Quinlan, C4.5: Programs for Machine Learning, Morgan Kaufmann Publishers, 1993.

KDD Cup 1999 data (Computer Network Intrusion Detection). http://kdd.ics.uci.edu/database/kddcup99/kddcup99.html

S.Ganapathy, P.Yogesh, A.Kannan, “An Intelligent Intrusion Detection System for Mobile Ad-Hoc Networks Using Classification Techniques”, Springer-CCIS, Vol. No. 148, pp. 117-122, 2011.

Xiaohua Hu, “DB-HReduction: A Data Preprocessing Algorithm for Data Mining Applications”, Proceedings on Applied Mathematics Letters, Elsevier, pp. 1-6, 2003.

Shuhua Teng, Jianwei Wu, Jixiang Sun, Shilin Zhou, and Gangqin Liu, “An Efficient Attribute Reduction Algorithm”, IEEE Conference, 2010.

Srinivas Mukkamala, Andrew H.Sung, “Detecting Denial of Service Attacks using Support Vector Machine”, The IEEE International Conference on Fuzzy Systems, pp. 1231-1236, 2003.

Snehal A.Mulay, P.R. Devale, G.V. Garje, “Intrusion Detection System using Support Vector Machine and Decision Tree”, International Journal of Computer Applications, Volume3-No.3, pp.0975-8887, June 2010.

R.Kerber, “Chi merge: Discretization of numeric attributes”, Proceedings on Ninth National Conference on Artificial Intelligence, pp. 129-134, 1992.

Chao-Ton Su and Jyn-Hwa Hsu, “ An Extended Chi2 Algorithm for Discretization of Real value attributes”, IEEE Transactions on Knowledge and Data Engineering, Vol. No. 17 Issue 3, March 2005.

F. E. H. Tay, L. Shen, “A Modified Chi2 Algorithm for Discretization”, IEEE Transactions on Knowledge and Data Engineering, v.14 n.3, p.666-670, May 2002.

Ahmad Ghodselahi, “A Hybrid Support Vector Machine Ensemble Model for Credit Scoring”, International Journal of Computer Applications,Vol. 17– No.5, pp. 0975 – 8887, March 2011.

B.M.Vidyavathi, Dr.C.N.Ravikumar,” A Novel Hybrid Filter Feature Selection Method for Data Mining”, Ubiquitous Computing and Communication Journal, pp.1-4, 2011.

Weka.en.malavida.com


Refbacks

  • There are currently no refbacks.