Network intrusion detection system using genetic network programming with support vector machine

Nowadays Internet Services spread all over the world. There are large amount of data present in the internet services. However the internet services increases at the same time intrusions also increases. Network Intrusion Detection Systems are used to detect the intrusions in the network. For efficient Network Intrusion Detection System the preprocessing is most essential. In order to preprocess the dataset Support Vector Machine algorithm is used and that gives the new data model which has been used for creating rules for misuse detection. The dataset can be classified into two datasets; namely positive kernel and negative kernel. Positive Kernel is used for creating the rules. After classifying the dataset, fuzzification is applied to that datset and then the rules has been created by Genetic Network Programming which based on direct graph structure. In the testing phase the system has been used to detect the misuse activities. By combining SVM with Genetic Network Programming increases the performance of the detection rate of the Network Intrusion Detection Model and reduces the false positive rate.

[1]  Doo Heon Song,et al.  A memory-based learning approach to reduce false alarms in intrusion detection , 2005, The 7th International Conference on Advanced Communication Technology, 2005, ICACT 2005..

[2]  Cheng Xiang,et al.  Design of Multiple-Level Hybrid Classifier for Intrusion Detection System , 2005, 2005 IEEE Workshop on Machine Learning for Signal Processing.

[3]  Salvatore J. Stolfo,et al.  Data Mining Approaches for Intrusion Detection , 1998, USENIX Security Symposium.

[4]  Risto Vaarandi Real-time classification of IDS alerts with data mining techniques , 2009, MILCOM 2009 - 2009 IEEE Military Communications Conference.

[5]  Xinghuo Yu,et al.  A simple and efficient hidden Markov model scheme for host-based anomaly intrusion detection , 2009, IEEE Network.

[6]  Hayder Radha,et al.  Joint network-host based malware detection using information-theoretic tools , 2010, Journal in Computer Virology.

[7]  Zhilin Feng,et al.  Research and Design for Intrusion Detection System with Hybrid Detector and Apriori Algorithm , 2010, 2010 2nd International Conference on E-business and Information System Security.

[8]  WenJie Tian,et al.  A new network intrusion detection identification model research , 2010, 2010 2nd International Asia Conference on Informatics in Control, Automation and Robotics (CAR 2010).

[9]  Cheng Xiang,et al.  Design of Multiple-Level Hybrid Classifier for Intrusion Detection System , 2005 .

[10]  Shingo Mabu,et al.  An Intrusion-Detection Model Based on Fuzzy Class-Association-Rule Mining Using Genetic Network Programming , 2011, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).

[11]  N.V.S. Reddy,et al.  A Two-stage Hybrid Model for Intrusion Detection , 2006, 2006 International Conference on Advanced Computing and Communications.

[12]  Wei Xu,et al.  Incremental SVM based on reserved set for network intrusion detection , 2011, Expert Syst. Appl..

[13]  Mrudula Gudadhe,et al.  A new data mining based network Intrusion Detection model , 2010, 2010 International Conference on Computer and Communication Technology (ICCCT).

[14]  P. Thangaraj,et al.  Implementation of two class classifiers for hybrid intrusion detection , 2010, 2010 International Conference on Communication and Computational Intelligence (INCOCCI).

[15]  S.F. Yusufovna,et al.  Integrating Intrusion Detection System and Data Mining , 2008, 2008 International Symposium on Ubiquitous Multimedia Computing.

[16]  Yi Hu,et al.  A data mining approach for database intrusion detection , 2004, SAC '04.

[17]  Jiawei Han,et al.  Data Mining: Concepts and Techniques , 2000 .

[18]  R. M. Chandrasekaran,et al.  Intrusion detection using neural based hybrid classification methods , 2011, Comput. Networks.

[19]  Ying Chen,et al.  Hybrid Intrusion Detection with Weighted Signature Generation over Anomalous Internet Episodes , 2007, IEEE Transactions on Dependable and Secure Computing.

[20]  Adam Carlson,et al.  Modeling network intrusion detection alerts for correlation , 2007, ACM Trans. Inf. Syst. Secur..

[21]  A. Kannan,et al.  An Intrusion Detection System Based on Multiple Level Hybrid Classifier using Enhanced C4.5 , 2008, 2008 International Conference on Signal Processing, Communications and Networking.

[22]  Joohan Lee,et al.  A dynamic data mining technique for intrusion detection systems , 2005, ACM Southeast Regional Conference.

[23]  Fredrick Mtenzi,et al.  Intrusion Detection Based on Data Mining , 2009, 2009 Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing.