Real detection intrusion using supervised and unsupervised learning

Advances in software and networking technologies have nowadays brought about innumerable benefits to both individuals and organizations. Along with technological explosions, there ironically exist numerous potential cyber-security breaches, thus advocating attackers to devise hazardous intrusion tactics against vulnerable information systems. Such security-related concerns have motivated many researchers to propose various solutions to face the continuous growth of cyber threats during the past decade. Among many existing IDS methodologies, data mining has brought a remarkable success in intrusion detection. However, data mining approaches for intrusion detection have still confronted numerous challenges ranging from data collecting and feature processing to the appropriate choice of learning methods and parametric thresholds. Hence, designing efficient IDS's remains very tough. In this paper, we propose a new intrusion detection system by combining unsupervised and supervised learning method. Results shows the performance of this system.

[1]  Vladimir N. Vapnik,et al.  The Nature of Statistical Learning Theory , 2000, Statistics for Engineering and Information Science.

[2]  Fabio Roli,et al.  Network Intrusion Detection by Combining One-Class Classifiers , 2005, ICIAP.

[3]  Ajith Abraham,et al.  Modeling intrusion detection system using hybrid intelligent systems , 2007, J. Netw. Comput. Appl..

[4]  Mohammad Saniee Abadeh,et al.  A parallel genetic local search algorithm for intrusion detection in computer networks , 2007, Eng. Appl. Artif. Intell..

[5]  Cheng Xiang,et al.  Design of Multiple-Level Hybrid Classifier for Intrusion Detection System , 2005, 2005 IEEE Workshop on Machine Learning for Signal Processing.

[6]  Rakesh Agarwal,et al.  Fast Algorithms for Mining Association Rules , 1994, VLDB 1994.

[7]  Andrew H. Sung,et al.  Intrusion detection using an ensemble of intelligent paradigms , 2005, J. Netw. Comput. Appl..

[8]  Wenke Lee,et al.  McPAD: A multiple classifier system for accurate payload-based anomaly detection , 2009, Comput. Networks.

[9]  Abdolreza Mirzaei,et al.  Intrusion detection using fuzzy association rules , 2009, Appl. Soft Comput..

[10]  Dong Seong Kim,et al.  INTRUSION DETECTION SYSTEM , 2013 .

[11]  Fabio Roli,et al.  Intrusion detection in computer networks by a modular ensemble of one-class classifiers , 2008, Inf. Fusion.

[12]  Mohammad Zulkernine,et al.  Anomaly Based Network Intrusion Detection with Unsupervised Outlier Detection , 2006, 2006 IEEE International Conference on Communications.

[13]  Fabio Roli,et al.  A Modular Multiple Classifier System for the Detection of Intrusions in Computer Networks , 2003, Multiple Classifier Systems.

[14]  Atsushi Imiya,et al.  Machine Learning and Data Mining in Pattern Recognition , 2013, Lecture Notes in Computer Science.

[15]  Siti Mariyam Shamsuddin,et al.  Ensemble classifiers for network intrusion detection system , 2009 .

[16]  Leo Breiman,et al.  Classification and Regression Trees , 1984 .

[17]  J. Ross Quinlan,et al.  C4.5: Programs for Machine Learning , 1992 .

[18]  Yoram Singer,et al.  Improved Boosting Algorithms Using Confidence-rated Predictions , 1998, COLT' 98.

[19]  Alfonso Valdes,et al.  Adaptive, Model-Based Monitoring for Cyber Attack Detection , 2000, Recent Advances in Intrusion Detection.

[20]  Dorothy E. Denning,et al.  An Intrusion-Detection Model , 1987, IEEE Transactions on Software Engineering.

[21]  金田 重郎,et al.  C4.5: Programs for Machine Learning (書評) , 1995 .

[22]  Qiang Chen,et al.  Multivariate Statistical Analysis of Audit Trails for Host-Based Intrusion Detection , 2002, IEEE Trans. Computers.

[23]  Yoram Singer,et al.  Improved Boosting Algorithms Using Confidence-rated Predictions , 1998, COLT' 98.

[24]  H. Javitz,et al.  Detecting Unusual Program Behavior Using the Statistical Component of the Next-generation Intrusion Detection Expert System ( NIDES ) 1 , 1997 .

[25]  Fabio Roli,et al.  Intrusion detection in computer networks by multiple classifier systems , 2002, Object recognition supported by user interaction for service robots.

[26]  Leo Breiman,et al.  Random Forests , 2001, Machine Learning.

[27]  S. E. Smaha Haystack: an intrusion detection system , 1988, [Proceedings 1988] Fourth Aerospace Computer Security Applications.