PERFORMANCE COMPARISON OF INTRUSION DETECTION SYSTEM USING VARIOUS TECHNIQUES – A REVIEW

Nowadays, the security has become a critical part of any organization or industry information systems. The Intrusion Detection System is an effective method to deal with the new kind of threats such as DoS, Porbe, R2L and U2R. In this paper, we analyze the various approaches such as Hidden Semi Markov Model, Conditional Random Fields and Layered Approach, Bayesian classification, Data Mining techniques, Clustering Algorithms such as K-Means and Fuzzy c-Means, Back Propagation Neural Network, SOM Neural Network, Rough Set Neural Network Algorithm, Genetic Algorithm, Pattern Matching, Principle Component Analysis, Linear Discriminant Analysis, Independent Component Analysis, Multivariate Statistical Analysis, SOM/PSO algorithm etc. The performance is measured for two different datasets using various approaches. The datasets are trained and tested for identifying the new attacks that will affect the hosts or networks. The well known KDD Cup 1999 or DARPA 1999 dataset has been used to improve the accuracy and performance. The four groups of attacks are identified as Probe, DoS, U2R and R2L. The dataset used for training set is 494,021 and testing set is 311,028. The aim is to improve the detection rate and performance of the proposed system.

[1]  N. Z. Tarapore,et al.  Design of Intrusion Detection System using Fuzzy Class-Association Rule Mining based on Genetic Algorithm , 2012 .

[2]  Kotagiri Ramamohanarao,et al.  Layered Approach Using Conditional Random Fields for Intrusion Detection , 2010, IEEE Transactions on Dependable and Secure Computing.

[3]  Henry Leung,et al.  Network Intrusion Detection Using CFAR Abrupt-Change Detectors , 2008, IEEE Transactions on Instrumentation and Measurement.

[4]  A. Anou,et al.  RETRACTED: A Bayesian Networks in Intrusion Detection Systems , 2007 .

[5]  Manas Ranjan Patra,et al.  SOME CLUSTERING ALGORITHMS TO ENHANCE THE PERFORMANCE OF THE NETWORK INTRUSION DETECTION SYSTEM , 2008 .

[6]  S. T. Sarasamma,et al.  Hierarchical Kohonenen net for anomaly detection in network security , 2005, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).

[7]  Md. Abu Naser Bikas,et al.  An Implementation of Intrusion Detection System Using Genetic Algorithm , 2012, ArXiv.

[8]  Thuzar Hlaing,et al.  Feature Selection and Fuzzy Decision Tree for Network Intrusion Detection , 2012 .

[9]  Zurina Mohd Hanapi,et al.  Hybrid of fuzzy Clustering Neural Network over NSL Dataset for Intrusion Detection System , 2013, J. Comput. Sci..

[10]  Muhammad Hussain,et al.  Optimized intrusion detection mechanism using soft computing techniques , 2013, Telecommun. Syst..

[11]  Taghi M. Khoshgoftaar,et al.  Active learning with neural networks for intrusion detection , 2010, 2010 IEEE International Conference on Information Reuse & Integration.

[12]  Mansour Sheikhan,et al.  Fast Neural Intrusion Detection System Based on Hidden Weight Optimization Algorithm and Feature Selection , 2009 .

[13]  Mansour Sheikhan,et al.  Intrusion detection using reduced-size RNN based on feature grouping , 2010, Neural Computing and Applications.

[14]  Neveen I. Ghali,et al.  Feature Selection for Effective Anomaly-Based Intrusion Detection , 2009 .

[15]  K Raghuveer,et al.  Performance evaluation of data clustering techniques using KDD Cup-99 Intrusion detection data set , 2012 .

[16]  S. Selvan,et al.  Intrusion Detection using an Improved Competitive Learning Lamstar Neural Network , 2007 .

[17]  Mostaque Md. Morshedur Hassan Current Studies On Intrusion Detection System, Genetic Algorithm And Fuzzy Logic , 2013, ArXiv.

[18]  Ravi Jain,et al.  D-SCIDS: Distributed soft computing intrusion detection system , 2007, J. Netw. Comput. Appl..

[19]  Gregorio Martínez Pérez,et al.  Intrusion detection using a linguistic hedged fuzzy-XCS classifier system , 2008, Soft Comput..

[20]  Sherif M. Badr Adaptive Layered Approach using C5.0 Decision Tree for Intrusion Detection Systems (ALIDS) , 2013 .

[21]  V. Venkatachalam,et al.  PERFORMANCE COMPARISON OF INTRUSION DETECTION SYSTEM CLASSIFIERS USING VARIOUS FEATURE REDUCTION TECHNIQUES , 2008 .

[22]  Xinghuo Yu,et al.  A simple and efficient hidden Markov model scheme for host-based anomaly intrusion detection , 2009, IEEE Network.

[23]  Dewan Md. Farid,et al.  Anomaly Network Intrusion Detection Based on Improved Self Adaptive Bayesian Algorithm , 2010, J. Comput..

[24]  R. Shanmugavadivu NETWORK INTRUSION DETECTION SYSTEM USING FUZZY LOGIC , 2011 .

[25]  G. Smaragdakis,et al.  Spatio-Temporal Network Anomaly Detection by Assessing Deviations of Empirical Measures , 2009, IEEE/ACM Transactions on Networking.

[26]  Mohammad Saniee Abadeh,et al.  A hybridization of evolutionary fuzzy systems and ant Colony optimization for intrusion detection , 2010, ISC Int. J. Inf. Secur..

[27]  R. S. Rajesh,et al.  A Genetic Algorithm Based elucidation for improving Intrusion Detection through condensed feature set by KDD 99 data set , 2011 .

[28]  Ahmad Habibizad Navin,et al.  A new system to evaluate GA-based clustering algorithms in Intrusion Detection alert management system , 2010, 2010 Second World Congress on Nature and Biologically Inspired Computing (NaBIC).

[29]  Hua Jiang,et al.  The Application of Genetic Neural Network in Network Intrusion Detection , 2009, J. Comput..

[30]  Qiang Chen,et al.  Multivariate Statistical Analysis of Audit Trails for Host-Based Intrusion Detection , 2002, IEEE Trans. Computers.

[31]  Amin Einipour,et al.  Intelligent Intrusion Detection in Computer Networks Using Fuzzy Systems , 2012 .

[32]  Sung-Bae Cho,et al.  Evolutionary neural networks for anomaly detection based on the behavior of a program , 2005, IEEE Trans. Syst. Man Cybern. Part B.

[33]  Shingo Mabu,et al.  An Intrusion-Detection Model Based on Fuzzy Class-Association-Rule Mining Using Genetic Network Programming , 2011, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).

[34]  Wei Hu,et al.  AdaBoost-Based Algorithm for Network Intrusion Detection , 2008, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).

[35]  Risto Miikkulainen,et al.  Intrusion Detection with Neural Networks , 1997, NIPS.

[36]  Sherif M. Badr Implementation of Intelligent Multi-Layer Intrusion Detection Systems (IMLIDS) , 2013 .

[37]  S. Selvakani,et al.  Feature Selection of Intrusion Detection Data using a Hybrid Genetic Algorithm/KNN Approach , 2003, HIS.

[38]  M. Sakthivel,et al.  A Refined Differential Evolution Algorithm Based Fuzzy Classifier for Intrusion Detection , 2011 .

[39]  Manas Ranjan Patra,et al.  Ensemble Voting System for Anomaly Based Network Intrusion Detection , 2009 .

[40]  Malcolm I. Heywood,et al.  Training genetic programming on half a million patterns: an example from anomaly detection , 2005, IEEE Transactions on Evolutionary Computation.

[41]  S. K. Srivatsa,et al.  Detecting and preventing attacks using network intrusion detection systems , 2008 .

[42]  Hongjoong Kim,et al.  A novel approach to detection of intrusions in computer networks via adaptive sequential and batch-sequential change-point detection methods , 2006, IEEE Transactions on Signal Processing.

[43]  Rung Ching Chen,et al.  Using Rough Set and Support Vector Machine for Network Intrusion Detection System , 2009, 2009 First Asian Conference on Intelligent Information and Database Systems.

[44]  Murad A. Rassam,et al.  Artificial Immune Network Clustering approach for Anomaly Intrusion Detection , 2012 .

[45]  Siti Mariyam Shamsuddin,et al.  Ensemble classifiers for network intrusion detection system , 2009 .