Review on anomaly based network intrusion detection system

In computer system and network, Intrusion detection is an important research area. A lot of mechanisms are available for detect the network intrusion, but that is not able to identify the new kind of attacks. Various techniques have already been implemented for finding and categorizing intrusions. The Intrusion Detection system (IDS) is two types, namely Network based IDS and Host IDS (HIDS). The manual classification of network data inspection is time consuming task, expensive as well as repetitive job. IDS mechanism is very helpful to find the network attacks and anomalies. In IDS, data mining methods is broadly used for extracting useful information from the massive amount dataset. This paper presents the investigation of different techniques and intrusion classification on KDD Cup 99 dataset. So, by classifying the different network issues a new and effective technique is implemented which can categorize and identify intrusions in the KDD Cup 99 dataset.

[1]  Hesham Altwaijry,et al.  Bayesian based intrusion detection system , 2012, J. King Saud Univ. Comput. Inf. Sci..

[2]  Dharmaraj R. Patil,et al.  Implementation of network intrusion detection system using variant of decision tree algorithm , 2015, 2015 International Conference on Nascent Technologies in the Engineering Field (ICNTE).

[3]  Sushanta Karmakar,et al.  Enhancing performance of anomaly based intrusion detection systems through dimensionality reduction using principal component analysis , 2016, 2016 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS).

[4]  Hussein A. Abbass,et al.  Evaluation of an adaptive genetic-based signature extraction system for network intrusion detection , 2011, Pattern Analysis and Applications.

[5]  Konstantinos Demertzis,et al.  A Hybrid Network Anomaly and Intrusion Detection Approach Based on Evolving Spiking Neural Network Classification , 2013, e-Democracy.

[6]  Siyang Zhang,et al.  A novel hybrid KPCA and SVM with GA model for intrusion detection , 2014, Appl. Soft Comput..

[7]  Thinagaran Perumal,et al.  Improving Anomalous Rare Attack Detection Rate for Intrusion Detection System Using Support Vector Machine and Genetic Programming , 2015, Neural Processing Letters.

[8]  Neelam Sharma,et al.  INTRUSION DETECTION USING NAIVE BAYES CLASSIFIER WITH FEATURE REDUCTION , 2012 .

[9]  Yoshihiro Oyama,et al.  Anomaly-Based Intrusion Detection System Sharing Normal Behavior Databases among Different Machines , 2009, 2009 Ninth IEEE International Conference on Computer and Information Technology.

[10]  Noor Ahmed Biswas,et al.  Artificial Neural Network based System for Intrusion Detection using Clustering on Different Feature Selection , 2015 .

[11]  Hassan Asgharian,et al.  A fast anomaly detection system using probabilistic artificial immune algorithm capable of learning new attacks , 2013, Evolutionary Intelligence.

[12]  Elias Procópio Duarte,et al.  System and Network Security: Anomaly Detection and Monitoring , 2016, J. Electr. Comput. Eng..

[13]  G Kalyani,et al.  Performance Assessment of Different Classification Techniques for Intrusion Detection , 2012 .

[14]  Jian Ma,et al.  A new approach to intrusion detection using Artificial Neural Networks and fuzzy clustering , 2010, Expert Syst. Appl..

[15]  Arputharaj Kannan,et al.  Intelligent Agent-Based Intrusion Detection System Using Enhanced Multiclass SVM , 2012, Comput. Intell. Neurosci..

[16]  Bose Sundan,et al.  A Dynamic Intrusion Detection System Based on Multivariate Hotelling's T2 Statistics Approach for Network Environments , 2015, TheScientificWorldJournal.

[17]  Saeed Sharifian,et al.  Modified parallel random forest for intrusion detection systems , 2016, The Journal of Supercomputing.

[18]  Gisung Kim,et al.  A novel hybrid intrusion detection method integrating anomaly detection with misuse detection , 2014, Expert Syst. Appl..

[19]  Shingo Mabu,et al.  A random-forests-based classifier using class association rules and its application to an intrusion detection system , 2016, Artificial Life and Robotics.

[20]  Cherukuri Aswani Kumar,et al.  Intrusion detection model using fusion of chi-square feature selection and multi class SVM , 2017, J. King Saud Univ. Comput. Inf. Sci..

[21]  Yue Wu,et al.  A New Intrusion Detection System Based on KNN Classification Algorithm in Wireless Sensor Network , 2014, J. Electr. Comput. Eng..

[22]  Ganesh Kumar,et al.  Anomaly Detection System in Cloud Environment Using Fuzzy Clustering Based ANN , 2015, Mobile Networks and Applications.

[23]  Bhavani M. Thuraisingham,et al.  A new intrusion detection system using support vector machines and hierarchical clustering , 2007, The VLDB Journal.

[24]  Cungen Cao,et al.  An incremental decision tree algorithm based on rough sets and its application in intrusion detection , 2011, Artificial Intelligence Review.

[25]  Chou-Yuan Lee,et al.  An intelligent algorithm with feature selection and decision rules applied to anomaly intrusion detection , 2012, Appl. Soft Comput..

[26]  Tanya Garg,et al.  Combinational feature selection approach for network intrusion detection system , 2014, 2014 International Conference on Parallel, Distributed and Grid Computing.

[27]  Wathiq Laftah Al-Yaseen,et al.  Hybrid Modified K-Means with C4.5 for Intrusion Detection Systems in Multiagent Systems. , 2015 .

[28]  Mohammad Zulkernine,et al.  Random-Forests-Based Network Intrusion Detection Systems , 2008, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).

[29]  Farah Jemili,et al.  Intrusion detection based on genetic fuzzy classification system , 2016, 2016 IEEE/ACS 13th International Conference of Computer Systems and Applications (AICCSA).

[30]  M. A. Jabbar,et al.  Intelligent network intrusion detection system using data mining techniques , 2016, 2016 2nd International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT).

[31]  Syed Ali Khayam,et al.  Accuracy improving guidelines for network anomaly detection systems , 2011, Journal in Computer Virology.

[32]  Amrit Pal Singh,et al.  Analysis of Host-Based and Network-Based Intrusion Detection System , 2014 .

[33]  Nasser Yazdani,et al.  Mutual information-based feature selection for intrusion detection systems , 2011, J. Netw. Comput. Appl..

[34]  Jaime Lloret,et al.  Intrusion Detection Systems Based on Artificial Intelligence Techniques in Wireless Sensor Networks , 2013, Int. J. Distributed Sens. Networks.

[35]  V. Vaidehi,et al.  Efficient host based intrusion detection system using Partial Decision Tree and Correlation feature selection algorithm , 2014, 2014 International Conference on Recent Trends in Information Technology.

[36]  P. Ganeshkumar,et al.  Adaptive Neuro-Fuzzy-Based Anomaly Detection System in Cloud , 2016, Int. J. Fuzzy Syst..

[37]  Arputharaj Kannan,et al.  Decision tree based light weight intrusion detection using a wrapper approach , 2012, Expert Syst. Appl..

[38]  Jasmin Kevric,et al.  An effective combining classifier approach using tree algorithms for network intrusion detection , 2017, Neural Computing and Applications.

[39]  Elsayed A. Sallam,et al.  A hybrid network intrusion detection framework based on random forests and weighted k-means , 2013 .