Genetic programming and K-nearest neighbour classifier based intrusion detection model

Incomputer networks, Intrusion Detection has become a major concern. In network security, various traditional techniques like intrusion prevention, cryptography and user authentication are unable to detect establishment of novel attacks. An intrusion detection systemis helpful in detecting an unusual intruder which cracks into the system or genuine user mistreating the system. Intrusion Detection System continually runs in the background and when any suspicious or obtrusive event occurs then it warns the user. To implement these systems various researchers introduced numerous machine learning techniques like Decision Trees, Support Vector Machines, Artificial Neural Networks, Linear Genetic Programming, Genetic Algorithms, Fuzzy Inference Systems, Rule Based Approach and their ensemble approaches with the intent to predict the data either normal or abnormal. In this paper genetic programming with K-Nearest Neighbor classifier is proposed so as to build an efficient Intrusion Detection Model. Optimal feature selection task is performed by genetic programming whereas the data mining classifier which performs the classification process is K-Nearest Neighbour. The main aim of genetic programming ist ο aid Κ-Nearest Neighbour. The experimental result shows that the validation accuracy for detecting attacks is 99.6%.

[1]  Nikhil R. Pal,et al.  A novel approach to design classifiers using genetic programming , 2004, IEEE Transactions on Evolutionary Computation.

[2]  Philip S. Yu,et al.  Top 10 algorithms in data mining , 2007, Knowledge and Information Systems.

[3]  Octavio Nieto-Taladriz,et al.  Improving network security using genetic algorithm approach , 2007, Comput. Electr. Eng..

[4]  Giandomenico Spezzano,et al.  GP Ensemble for Distributed Intrusion Detection Systems , 2005, ICAPR.

[5]  Le Gruenwald,et al.  A survey of data mining and knowledge discovery software tools , 1999, SKDD.

[6]  Eugene H. Spafford,et al.  Applying Genetic Programming to Intrusion Detection , 1995 .

[7]  M.Govindarajan Hybrid Intrusion Detection Using Ensemble of Classification Methods , 2014 .

[8]  Ali A. Ghorbani,et al.  A detailed analysis of the KDD CUP 99 data set , 2009, 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications.

[9]  Ajith Abraham,et al.  Intrusion detection using error correcting output code based ensemble , 2014, 2014 14th International Conference on Hybrid Intelligent Systems.

[10]  Muttukrishnan Rajarajan,et al.  A survey of intrusion detection techniques in Cloud , 2013, J. Netw. Comput. Appl..

[11]  Pavel Brazdil,et al.  Comparison of SVM and Some Older Classification Algorithms in Text Classification Tasks , 2006, IFIP AI.

[12]  Saman Taghavi Zargar,et al.  A Survey of Defense Mechanisms Against Distributed Denial of Service (DDoS) Flooding Attacks , 2013, IEEE Communications Surveys & Tutorials.

[13]  Ajith Abraham,et al.  Modeling intrusion detection system using hybrid intelligent systems , 2007, J. Netw. Comput. Appl..

[14]  Svein J. Knapskog,et al.  Attribute Normalization in Network Intrusion Detection , 2009, 2009 10th International Symposium on Pervasive Systems, Algorithms, and Networks.

[15]  Hugo Jair Escalante,et al.  Learning to Assemble Classifiers via Genetic Programming , 2014, Int. J. Pattern Recognit. Artif. Intell..

[16]  Ajith Abraham,et al.  Feature deduction and ensemble design of intrusion detection systems , 2005, Comput. Secur..

[17]  Akhilesh Tiwari,et al.  A Novel Data Mining based Hybrid Intrusion Detection Framework , 2014 .

[18]  Raja Azlina Raja Mahmood,et al.  Feature Selection Based on Genetic Algorithm and SupportVector Machine for Intrusion Detection System , 2013 .

[19]  Wei Lu,et al.  Detecting New Forms of Network Intrusion Using Genetic Programming , 2004, Comput. Intell..

[20]  Amin Dastanpour,et al.  Using Genetic Algorithm to Supporting Artificial Neural Network for Intrusion Detection System , 2014 .

[21]  Neal Krawetz Introduction to network security , 2006 .