A Layered Approach for Pattern Recognition in Large Dataset Using Meta modeling with Classification Techniques

Security of computers and networks that connect them is increasingly becoming of great significant. Intrusion detection is the act of detecting actions that attempts to compromise the clandestinely, credibility or availability of a network resource. It is an important attribute of defensive measure protecting computer system and network traffic from abuses. Here, we are focusing on two important aspects of intrusion detection; one is accuracy and other is performance. In the paper it is demonstrated that high attack detection accuracy can be achieved by using meta-modeling techniques in combination with classification techniques and high performance is attained by the layered approach. To test the results we have used NSL-KDD datasets; and also applied PCA for feature reduction that results in a significant improvement on learning algorithms. In this paper, we have designed and evaluated the combinational models for intrusion detection mechanism, and later we compared those models with each other and tried to find which is more accurate and appropriate to detect intrusion. We have applied meta-modeling because it gives better classification performance than any individual classifier. Our research has shown that the combination of meta-modeling algorithms with SVM gives better overall accuracy than any other combinational model. Index Terms—Meta-modeling techniques, Classification techniques, Layered approach, PCA.

[1]  K. L. Shunmuganathan,et al.  A computational intelligence for evaluation of intrusion detection system , 2011 .

[2]  Ali A. Ghorbani,et al.  Research on Intrusion Detection and Response: A Survey , 2005, Int. J. Netw. Secur..

[3]  Gabriel Maciá-Fernández,et al.  Anomaly-based network intrusion detection: Techniques, systems and challenges , 2009, Comput. Secur..

[4]  R. Polikar,et al.  Ensemble based systems in decision making , 2006, IEEE Circuits and Systems Magazine.

[5]  Pavel Pudil,et al.  Introduction to Statistical Pattern Recognition , 2006 .

[6]  David W. Opitz,et al.  An Empirical Evaluation of Bagging and Boosting , 1997, AAAI/IAAI.

[7]  G. MeeraGandhi,et al.  Effective Network Intrusion Detection using Classifiers Decision Trees and Decision rules , 2010 .

[8]  Longbing Cao,et al.  Novel Intrusion Detection using Probabilistic Neural Network and Adaptive Boosting , 2009, ArXiv.

[9]  Richard D. De Veaux Bagging and Boosting , 2005 .

[10]  Ajith Abraham,et al.  An Empirical Comparison of Kernel Selection for Support Vector Machines , 2002, HIS.

[11]  Wei Hu,et al.  AdaBoost-Based Algorithm for Network Intrusion Detection , 2008, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).

[12]  P. R. Devale,et al.  Decision tree based Support Vector Machine for Intrusion Detection , 2010, 2010 International Conference on Networking and Information Technology.

[13]  Kotagiri Ramamohanarao,et al.  Layered Approach Using Conditional Random Fields for Intrusion Detection , 2010, IEEE Transactions on Dependable and Secure Computing.

[14]  Si Wu,et al.  Improving support vector machine classifiers by modifying kernel functions , 1999, Neural Networks.