Online Anomaly Based Intrusion Detection System Using Machine Learning

D.P. Gaikwad*, R.C. Thool**
* Assistant Professor, Department of Computer Engineering, All India Shri Shivaji Memorial Society’s College of Engineering, Pune.
** Professor, Head of Department of Information technology, Shri Guru Gobind Singhji Institute of Engineering and Technology, Nanded
Periodicity:November - January'2014
DOI : https://doi.org/10.26634/jcc.1.1.2800

Abstract

As the cost of information processing and Internet accessibility falls, organizations are becoming gradually defenceless to potential cyber threats such as network intrusions. So, there exists a need to run secure and safe transactions through the use of Intrusion Detection Systems, authentication, firewall and other hardware and software solutions. The existing Intrusion Detection system abilities to be adapted are very limited. This makes them ineffective for new or unknown attacks detection or to be adapted to an evolutionary environment. Machine learning approaches offer a potential solution to adaptation and correctness problems in Intrusion detection.Some Intrusion Detection systems does not deal with real time high speed networks. The high false positive rate is another issue with existing intrusion detection systems. In this paper, we present the machine learning approach for Intrusion Detection system which helps to reduce the false positive rates and increase the classification accuracy. We are going to train our system using the Real time data set using Naïve Bayes machine learning algorithm. The role of our system is to attempt to trap an adversary's attendance on a compromised network. Our System notices vulnerable packets that are trying to come into the network. We capture live packets and extract only the relevant header features.This improves the accuracy of the proposed system.Finally, using Naïve Based off-line trainer, we were able to achieve 90.2233 percent accuracy using Cross Validation of 10-fold and 76.6812 percent using supplied test dataset while maintaining 0.102 false positive rates.

Keywords

Naïve Bayes, Real Time, Machine Learning, Report Generation, Signature.

How to Cite this Article?

Gaikwad, D. P., and Thool, R. C. (2014). Online Anomaly Based Intrusion Detection System Using Machine Learning. i-manager’s Journal on Cloud Computing, 1(1), 19-25. https://doi.org/10.26634/jcc.1.1.2800

References

[1]. Christine Dartigue, Hyun Ik Jang and Wensum Zeng (2009). “A New Data-Mining Based Approach for Network Intrusion Detection”, In proceeding of IEEE Seventh Annual Communication Networks and Services Research Conference.
[2]. Sandhya Peddabachigari, Ajith Abraham and Johnson Thomas (2008). “Intrusion Detection Systems Using Decision Trees and Support Vector Machines“ ,Department of Computer Science, Oklahoma State University, USA .
[3]. G.Prashanth, V.Prashanth, P.Jayashree and N.Srinivasan (2008). “Using Random Forests for Networkbased Anomaly detection at Active routers”, In proceeding of IEEE-International Conference on Signal processing, Communications and Networking. Madras Institute of Technology, Anna University Chennai India, pp93-96.Jan.
[4]. MehdiMoradi and Mohammad ZULKERNINE. “A Neural Network Based System for Intrusion Detection and Classification of Attacks”, pp.148-04.
[5]. Amira Sayed A. Aziz Mostafa A. Salama,Aboul ella Hassanien and Sanaa El-Ola Hanafi (2012). “Artificial Immune System Inspired Intrusion Detection System Using Genetic Algorithm”. In Informatics 36 (2012), pp. 347–357.
[6]. Jonathan Palmer (2011). “Naive Bayes Classification for Intrusion Detection Using Live Packet Capture”. In Data Mining in Bioinformatics, Spring.
[7]. Salem Benferhat, Abdelhamid Boudjelida and Habiba Drias (2009). “An Intrusion Detection Approach Based on Tree Augmented Naive Bayes and Expert Knowledge”.
[8]. Amjad Hussain Bhat, Sabyasachi Patra and Dr. Debasish Jena (2013). “,Machine Learning Approach for Intrusion Detection on CloudVirtual Machines” In IEEE Conference.
[9]. Upendra (2013). “An Efficient Feature Reduction Comparison of Machine Learning Algorithms for Intrusion Detection System”. International Journal of Emerging Trends & Technology in Computer Science on ,Volume 2(1), January.
[10]. Mohan Banerjee and Roopali Soni(2013). “Design and Implementation of Network Intrusion Detection System by using K-means clustering and Naïve Bayes”. International Journal of Science, Engineering and Technology Research, Volume 2, Issue 3, March 2013.
[11]. Neethu B (2009). “Classification of Intrusion Detection Dataset usingmachine learning Approaches“, International Journal of Electronics and Computer Science Engineering. ISSN 2277-1956/V1N3-1044-1051.
[12]. Dewan Md. Farid1, Nouria Harbi1 and Mohammad Zahidur Rahman (2010). “Combining Naïve Bayes and Decision Tree For Adaptive Intrusion Detection”. International Journal of Network Security & Its Applications (IJNSA), Volume 2, Number 2, April 2010.
[13]. Mrutyunjaya Panda and Manas Ranjan Patra (2007).“Network Intrusion Detection Naïve Bayes“ International Journal of Computer Science and Network Security on VOL.7 No.12, December 2007258,Manuscript received December 5, 2007,Manuscript revised December 20, 2007
[14]. D.P.Gaikwad and Dr.R.C.Thool (2010). “Architecture Taxonomy and Product of IDS”, in proceeding of International Conference on Computer Applications, Computer Application-II, and doi: 10.3850/978-981-08- 7304-2_0382.
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Pdf 35 35 200 20
Online 35 35 200 15
Pdf & Online 35 35 400 25

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.