Sequential classifiers for network intrusion detection based on data selection process

With the emergence of large datasets in real-time applications as network intrusion detection, systems classification have gained more attention due to the importance of these applications and the increasing generation of these network traffic information. The proliferation of Internet and networking applications, coupled with the widespread availability of system hacks and viruses have increased the need for network security. However, the huge network traffic data slow down the entire intrusion detection process and may lead to unsatisfactory classification accuracy due to the computational difficulties in handling such data. Classifying a huge amount of data usually lead to higher computational complexity. We propose sequential classifiers based on data selection process for intrusion detection. The performance of the proposed approach is evaluated using a intrusion detection dataset, KDD Cup'99 dataset, which is a typical example of large-scale datasets. The evaluation results show that our approach achieves better precision and lower computational cost compared with the state-of-the-art mechanisms.

[1]  J. A. Hartigan,et al.  A k-means clustering algorithm , 1979 .

[2]  Itzhak Levin,et al.  KDD-99 classifier learning contest LLSoft's results overview , 2000, SKDD.

[3]  Juan Carlos Corrales,et al.  A Conceptual Framework for Data Quality in Knowledge Discovery Tasks (FDQ-KDT): A Proposal , 2015, J. Comput..

[4]  Thomas J. Hacker,et al.  Competitive K-Means, a New Accurate and Distributed K-Means Algorithm for Large Datasets , 2013, 2013 IEEE 5th International Conference on Cloud Computing Technology and Science.

[5]  Taghi M. Khoshgoftaar,et al.  Active learning with neural networks for intrusion detection , 2010, 2010 IEEE International Conference on Information Reuse & Integration.

[6]  Xiangjian He,et al.  Building an Intrusion Detection System Using a Filter-Based Feature Selection Algorithm , 2016, IEEE Transactions on Computers.

[7]  Shi-Jinn Horng,et al.  A novel intrusion detection system based on hierarchical clustering and support vector machines , 2011, Expert Syst. Appl..

[8]  Saichon Jaiyen,et al.  Intrusion detection model based on ensemble learning for U2R and R2L attacks , 2015, 2015 7th International Conference on Information Technology and Electrical Engineering (ICITEE).

[9]  Xu Rongsheng,et al.  Modeling Intrusion Detection System by Discovering Association Rule in Rough Set Theory Framework , 2006, 2006 International Conference on Computational Inteligence for Modelling Control and Automation and International Conference on Intelligent Agents Web Technologies and International Commerce (CIMCA'06).

[10]  Bernhard Pfahringer,et al.  Winning the KDD99 classification cup: bagged boosting , 2000, SKDD.

[11]  Jennifer Widom,et al.  Models and issues in data stream systems , 2002, PODS.

[12]  Abdulkadir Sengür,et al.  Evaluation of ensemble methods for diagnosing of valvular heart disease , 2010, Expert Syst. Appl..

[13]  Amnon Shashua,et al.  On the Relationship Between the Support Vector Machine for Classification and Sparsified Fisher's Linear Discriminant , 1999, Neural Processing Letters.

[14]  Adel Nadjaran Toosi,et al.  A new approach to intrusion detection based on an evolutionary soft computing model using neuro-fuzzy classifiers , 2007, Comput. Commun..

[15]  Shangteng Huang,et al.  A Projected Feature Selection Algorithm for Data Classification , 2007, 2007 International Conference on Wireless Communications, Networking and Mobile Computing.

[16]  Chen Junjie,et al.  Application of Unbalanced Data Approach to Network Intrusion Detection , 2009, 2009 First International Workshop on Database Technology and Applications.

[17]  Aiko M. Hormann,et al.  Programs for Machine Learning. Part I , 1962, Inf. Control..

[18]  Chih-Fong Tsai,et al.  Credit rating by hybrid machine learning techniques , 2010, Appl. Soft Comput..

[19]  Heekuck Oh,et al.  Neural Networks for Pattern Recognition , 1993, Adv. Comput..

[20]  Ramesh C. Agarwal,et al.  PNrule: A New Framework for Learning Classifier Models in Data Mining (A Case-Study in Network Intrusion Detection) , 2001, SDM.