Open Access Open Access  Restricted Access Subscription or Fee Access

Network Traffic Classification - Construction of IDS using Machine Learning Approaches

C. Seelammal, Dr.T. Subbulakshmi

Abstract


Intrusion Detection System (IDS) has been used as a vital instrument in defending the network from this malicious or abnormal activity. it is still desirable to know what intrusions have happened or are happening, so that we can understand the security threats and risks and thus be better prepared for future attacks With the ability to analyze network traffic and recognize incoming and ongoing network attack, majority of network administrator has turn to IDS to help them in detecting anomalies in network traffic In this paper, we focus on different types of attacks on IDS this paper gives a description of different attack on different protocol such as TCP ,UDP,ARP and ICMP. Results show that the detection accuracy of the Genetic based classification accuracy is high at low false-positive-rate on KDD.

Keywords


Attack, DoS, Intrusion Detection, NIDS, Protocols.

Full Text:

PDF

References


Faizal, M.A., Mohd Zaki M., Shahrin Sahib, Robiah, Y., Siti Rahayu, S., and Asrul Hadi, Y. "Time Based Intrusion Detection on Fast Attack for Network Intrusion Detection System", Second International Conference on Network Applications, Protocols and Services, IEEE, 2010.

Cuppen, F. & Miege, A. (2002). Alert Correlation in a Cooperative Intrusion Detection Framewok. In Proceeding of the 2002 IEEE Symposium on Security and Privacy. IEEE, 2002.

Cabrera, J.B.D., Ravichandran, B & Mehra R.K. (2000). Statistical Traffic Modelling for Network Intrusion Detection. In Proceeding of the IEEE Conference.

A. Lazarevic, A. Ozgur, L. Ertoz, J. Srivastava, and V. Kumar, “A Comparative Study of Anomaly Detection Schemes in Network Intrusion Detection” , Proceedings of SIAM International Confonference on Data Mining, May 2003.

Suseela T.Sarasamma , Quiming A.Zhu , and Julie Huff , “ Hierarchial KMeans+ID3: A Novel Method for Supervised Anomaly Detection by Cascading K-Meaohenen net for anomaly detection in network security “, IEEE Trans.Syst.,Man and Cybern., vol.35, no.2,pp.302,Apr.2005.

M. Thottan and C. Ji, “Anomaly Detection in IP Networks,” IEEE Trans. Signal Processing, vol. 51, no. 8, pp. 2191-2204, May.2003.

C. Kruegel and G. Vigna, “Anomaly Detection of Web-Based Attacks,” Proc. ACM Conf. Computer and Comm. Security, Oct. 2003.

Z. Zhang, J. Li, C.N. Manikopoulos, J. Jorgenson, and J. Ucles,“HIDE: A Hierarchical Network Intrusion Detection System Using Statistical Preprocessing and Neural Network Classification,” Proc. 2001 IEEE Workshop Information Assurance, pp. 85-90, June 2001.

S.T. Sarasamma, Q.A. Zhu, and J. Huff, “Hierarchical Kohonen Net for Anomaly Detection in Network Security,” IEEE Trans.Systems, Man, and Cybernetics-Part B, vol. 35, no. 2, pp.450,Apr. 2005.

J. Gomez and D.D. Gup ta, “Evolving Fuzzy Classifiers for Intrusion Detection,” Proc. 2002 IEEE Workshop Information Assurance, June 2001. A. Ray, “Symbolic Dynamic Analysis of Complex Systems for Anomaly Detection,” Signal Processing, vol. 84, no. 7, pp. 1115-1130, 2004.

N. Ye, S.M. Emran, Q. Chen, and S. Vilbert, “Multivariate Statistical Analysis of Audit Trails for Host-Based Intrusion Detection,” IEEE Trans. Computers, vol. 51, no. 7, pp. 810-820, 2002.

H.S. Javitz and A. Valdes, “The SRI IDES Statistical Anomaly Detector,” Proc. IEEE Symp. Security and Privacy, Vol.87,no.7,pp. 316-326, May 1991.

J. Kittler, M. Hatef, R.P.W. Duin, and J. Matas, “On Combining Classifiers,” IEEE Trans. Pattern Analysis and Machine Intelligence,vol. 20, no. 3, pp. 226-239, Mar. 1998.

L.I. Kuncheva, “Switching between Selection and Fusion in Combining Classifiers: An Experiment,” IEEE Trans. Systems, Man, and Cybernetics, vol. 32, no. 2, pp. 146-156, Apr. 2002.

R.P. Lippman, D.J. Fried, I. Graf, J. Haines, K. Kendall, D.McClung, D. Weber, S. Webster, D. Wyschogrod, R.K. Cunningham, and M.A. Zissman, “Evaluating Intrusion Detection Systems:The 1998 DARPA Off-Line Intrusion Detection Evaluation,” Proc.DARPA Information Survivability Conf. and Exposition (DISCEX ‟00), pp. 12-26, Jan. 2000.

The third international knowledge discovery and data mining tools competition dataset KDD99-Cup, http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html, 1999.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.