scispace - formally typeset
Open Access

Implementation of two class classifiers for hybrid intrusion detection

TLDR
In this paper, a multi-stages approach is proposed to enhance the overall performance of IDSs, which is based on a single algorithm that is designed to either model normal behavior patterns or attack signatures in network data traffic.
Abstract
Most intrusion detection systems (IDSs) are based on a single algorithm that is designed to either model normal behavior patterns or attack signatures in network data traffic. Most often, these systems fail to provide adequate alarm capability that reduces false positive and false negative rates. We had proposed multi-stages approaches to enhance the overall performance of IDSs. All models implemented in this paper, must have a perfect 2-classes classifier to differentiate between attacks & normal patterns, so we grant to detect attacks at first stage of IDS and secure the protected system, through other stages we tried to identify the name of intrusion to increase the efficiency of IDS. The first stage is highly capable in detecting normal signature and diverse what-else to attacks category, so it is capable in detecting unseen or unknown attacks. The results of the proposed techniques had shown that a very high increase in the performance of IDS systems. The practical results showed that the multistage system composed of MLP and improved hybrid J48-DT provided the best results among all discussed systems.

read more

Citations
More filters
Journal ArticleDOI

Network Anomaly Detection: Methods, Systems and Tools

TL;DR: This paper provides a structured and comprehensive overview of various facets of network anomaly detection so that a researcher can become quickly familiar with every aspect of network anomalies detection.
Book

Network Anomaly Detection: A Machine Learning Perspective

TL;DR: Examining numerous attacks in detail, the authors look at the tools that intruders use and show how to use this knowledge to protect networks.
Book ChapterDOI

Network Traffic Anomaly Detection Techniques and Systems

TL;DR: This chapter starts with a discussion of the basic properties of network-wide traffic with an example, and is organized into six major sections to describe different network anomaly detection techniques and systems.
Proceedings ArticleDOI

Network intrusion detection system using genetic network programming with support vector machine

TL;DR: By combining SVM with Genetic Network Programming increases the performance of the detection rate of the Network Intrusion Detection Model and reduces the false positive rate.
Journal ArticleDOI

Kinship Verification Through Facial Images Using CNN-Based Features

TL;DR: A kinship verification system that starts with pair of facial images of the child and parent, then as a final result is determine whether two persons have a kin relation or not, which indicates that the system is robust compared to other existing approaches.
References
More filters
Journal ArticleDOI

The 1999 DARPA off-line intrusion detection evaluation

TL;DR: This report describes new and known approaches and strategies that were used to make attacks stealthy for the 1999 DARPA Intrusion Detection Evaluation, and includes many examples of stealthy scripts that can be use to implement stealthy procedures.
Journal ArticleDOI

Feature deduction and ensemble design of intrusion detection systems

TL;DR: This study investigated the performance of two feature selection algorithms involving Bayesian networks and Classification and Regression Trees and an ensemble of BN and CART and proposed an hybrid architecture for combining different feature selection algorithm for real world intrusion detection.
Proceedings Article

Selecting Features for Intrusion Detection: A Feature Relevance Analysis on KDD 99.

TL;DR: To substantiate the performance of machine learning based detectors that are trained on KDD 99 training data, the relevance of each feature is investigated and information gain is employed to determine the most discriminating features for each class.

NIST Special Publication on Intrusion Detection Systems

Rebecca Bace, +1 more
TL;DR: This guidance document is intended as a primer in intrusion detection, developed for those who need to understand what security goals intrusion detection mechanisms serve, how to select and configure intrusion detection systems for their specific system and network environments, and how to integrate intrusion detection functions with the rest of the organizational security infrastructure.
Journal ArticleDOI

Intrusion detection techniques and approaches

TL;DR: These techniques including an IDS architectural outline and an analysis of IDS probe techniques finishing with a summary of associated technologies are described.
Related Papers (5)