Although an intelligent intrusion and detection strategies are used to detect any false alarms within network critical segments of network infrastructures, reducing false positives are still being a major challenges. Up to this moment, these strategies focus on either detection or response features, but often lack of having both features together. Without considering those features together, intrusion detection systems are probably cannot highly detect on low false alarm rates. To offset abovementioned constraints, this paper proposes a strategy to focus on detection involving statistical analysis of both attack and normal traffics based on the training data of KDD Cup 99. This strategy is also included a hybrid statistical approach which using Data Mining and Decision Tree Classification. As a result, the statistical analysis can be manipulated to reduce misclassification of false positives and distinguish between attacks and false positives for the data of KDD Cup 99. Therefore, this strategy can be used to evaluate and enhance the capability of the IDS to detect and at the same time to respond to the threats and benign traffic in critical segments of network, application and database infrastructures.
[1]
Radia Perlman,et al.
Network Security
,
2002
.
[2]
Kristopher Kendall,et al.
A Database of Computer Attacks for the Evaluation of Intrusion Detection Systems
,
1999
.
[3]
Csilla Farkas,et al.
PAID: A Probabilistic Agent-Based Intrusion Detection system
,
2005,
Comput. Secur..
[4]
Frank S. Rietta.
Application layer intrusion detection for SQL injection
,
2006,
ACM-SE 44.
[5]
Ravi Jain,et al.
Soft Computing Models for Network Intrusion Detection Systems
,
2005,
Classification and Clustering for Knowledge Discovery.
[6]
Ethem Alpaydin,et al.
Introduction to machine learning
,
2004,
Adaptive computation and machine learning.
[7]
Salvatore J. Stolfo,et al.
A data mining framework for building intrusion detection models
,
1999,
Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344).
[8]
Peter Mell,et al.
NIST Special Publication on Intrusion Detection Systems
,
2001
.