Four Char DNA Encoding for Anomaly Intrusion Detection System

Recent research has shown that a Deoxyribonucleic Acid (DNA) has ability to be used to discover diseases in human body as its function can be used for an intrusion-detection system (IDS) to detect attacks against computer system and networks traffics. Three main factor influenced the accuracy of IDS based on DNA sequence, which is DNA encoding method, STR keys and classification method to classify the correctness of proposed method. The pioneer idea on attempt a DNA sequence for intrusion detection system is using a normal signature sequence with alignment threshold value, later used DNA encoding based cryptography, however the detection rate result is very low. Since the network traffic consists of 41 attributes, therefore we proposed the most possible less character number (same DNA length) which is four-character DNA encoding that represented all 41 attributes known as DEM4all. The experiments conducted using standard data KDDCup 99 and NSL-KDD. Teiresias algorithm is used to extract Short Tandem Repeat (STR), which includes both keys and their positions in the network traffic, while Brute-force algorithm is used as a classification process to determine whether the network traffic is attack or normal. Experiment run 30 times for each DNA encoding method. The experiment result shows that proposed method has performed better accuracy (15% improved) compare with previous and state of the art DNA algorithms. With such results it can be concluded that the proposed DEM4all DNA encoding method is a good method that can used for IDS. More complex encoding can be proposed that able reducing less number of DNA sequence can possible produce more detection accuracy.

[1]  Dieter Hogrefe,et al.  Two Layers Multi-class Detection method for network Intrusion Detection System , 2017, 2017 IEEE Symposium on Computers and Communications (ISCC).

[2]  Md. Abu Naser Bikas,et al.  An Implementation of Intrusion Detection System Using Genetic Algorithm , 2012, ArXiv.

[3]  Chithralekha Balamurugan,et al.  A Novel DNA Computing Based Encryption and Decryption Algorithm , 2015 .

[4]  Mohamed Moughit,et al.  An efficient method for evaluating alerts of Intrusion Detection Systems , 2017, 2017 International Conference on Wireless Technologies, Embedded and Intelligent Systems (WITS).

[5]  Adel Sabry Eesa,et al.  A novel feature-selection approach based on the cuttlefish optimization algorithm for intrusion detection systems , 2015, Expert Syst. Appl..

[6]  Manuel Alfonseca,et al.  Network intrusion detection using genetic algorithm to find best DNA signature , 2008, ICONS 2008.

[7]  Liang He,et al.  An Improved Intrusion Detection based on Neural Network and Fuzzy Algorithm , 2014, J. Networks.

[8]  Cherukuri Aswani Kumar,et al.  Intrusion detection model using fusion of chi-square feature selection and multi class SVM , 2017, J. King Saud Univ. Comput. Inf. Sci..

[9]  A. Ayyasamy,et al.  A Novel Ensemble Approach for Effective Intrusion Detection System , 2017, 2017 Second International Conference on Recent Trends and Challenges in Computational Models (ICRTCCM).

[10]  Zulaiha Ali Othman,et al.  A novel DNA sequence approach for network intrusion detection system based on cryptography encoding method , 2017 .

[12]  Wathiq Laftah Al-Yaseen,et al.  Multi-level hybrid support vector machine and extreme learning machine based on modified K-means for intrusion detection system , 2017, Expert Syst. Appl..

[13]  Stefan Savage,et al.  Inside the Slammer Worm , 2003, IEEE Secur. Priv..

[14]  Sarab M. Hameed,et al.  Intrusion Detection Approach Based on DNA Signature , 2014 .

[15]  Ranbir Soram,et al.  Biometric DNA and ECDLP-based Personal Authentication System: A Superior Posse of Security , 2010 .

[16]  Wolfgang Banzhaf,et al.  The use of computational intelligence in intrusion detection systems: A review , 2010, Appl. Soft Comput..

[17]  Zhang Bin,et al.  A Clustering Algorithm Oriented to Intrusion Detection , 2017, 22017 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC).

[18]  Zulaiha Ali Othman,et al.  Matching algorithms for intrusion detection system based on DNA encoding , 2018 .

[19]  Wenjuan Li,et al.  Constructing Context-based Non-Critical Alarm Filter in Intrusion Detection , 2012 .

[20]  Karen A. Scarfone,et al.  Guide to Intrusion Detection and Prevention Systems (IDPS) , 2007 .