Multilevel Intrusion Detection System with Affinity Clustering and Ensemble SVM

Authors

  • Sadhana Patidar  M.Tech Scholar, Department of CSE RITS, Bhopal, Madhya Pradesh, India
  • Priyanka Parihar  Assistant Professor, Department of CSE RITS, Bhopal, Madhya Pradesh, India
  • Chetan Agrawal  Assistant Professor, Department of CSE RITS, Bhopal, Madhya Pradesh, India

DOI:

https://doi.org/10.32628/CSEIT206431

Keywords:

Intrusion Detection System, Affinity Clustering, Ensemble Support Vector Machine, NSL-KDD, UNSW-NB 15, Detection Rate

Abstract

Now-a-days with growing applications over internet increases the security issues over network. Many security applications are designed to cope with such security concerns but still it required more attention to improve speed as well accuracy. With advancement of technologies there is also evolution of new threats or attacks in network. So, it is required to design such detection system that can handle new threats in network. One of the network security tools is intrusion detection system which is used to detect malicious data packets. Machine learning tool is also used to improve efficiency of network-based intrusion detection system. In this paper, an intrusion detection system is proposed with an application of machine learning tools. The proposed model integrates feature reduction, affinity clustering and multilevel Ensemble Support Vector Machine. The proposed model performance is analyzed over two datasets i.e. NSL-KDD and UNSW-NB 15 dataset and achieved approx. 12% of efficiency over other existing work.

References

  1. De Boer, P., Pels, M, “Host-Based Intrusion Detection Systems”, Amsterdam University, Amsterdam, 2005.
  2. Garcia-Teodoro, P., “Anomaly-based network intrusion detection: techniques”, systems and challenges. Comput. Security vol. 28.issue, pp. 18–28, 2009.
  3. J. Ryan, M. Lin, and R. Miikkulainen, “Intrusion Detection with Neural Networks,” Conference in Neural Information Processing Systems, 943–949.
  4. A. K. Ghosh and A. Schwartzbard, “A Study in Using Neural Networks for Anomaly and Misuse Detection,” Conference on USENIX Security Symposium, Volume 8, pp. 12–12, 1999.
  5. P. L. Nur, A. N. Zincir-heywood, and M. I. Heywood, “Host-Based Intrusion Detection Using Self-Organizing Maps,” in Proceedings of the IEEE International Joint Conference on Neural Networks, pp. 1714–1719, 2002.
  6. K. Labib and R. Vemuri, “NSOM: A Real-Time Network-Based Intrusion Detection System Using Self-Organizing Maps,” 2000.
  7. Sharma, R.K., Kalita, H.K., Issac, B., “Different firewall techniques: a survey”, International Conference on Computing, Communication and Networking Technologies (ICCCNT), IEEE, 2014.
  8. Meng, Y.-X., “The practice on using machine learning for network anomaly intrusion detection”, International Conference on Machine Learning and Cybernetics (ICMLC), vol. 2, IEEE, 2011.
  9. Feng, W., “Mining network data for intrusion detection through combining SVMs with ant colony networks”, Future Generation Computer, System, vol. 37, pp. 127–140, 2014.
  10. Manjula C. Belavagi and BalachandraMuniyal, “Performance Evaluation of Supervised Machine Learning Algorithms for Intrusion Detection, Procedia Computer Science”, Elsevier, 2016.
  11. Saad Mohamed Ali Mohamed Gadal and Rania A. Mokhtar, “Anomaly Detection Approach using Hybrid Algorithm of Data Mining Technique”, International Conference on Communication, Control, Computing and Electronics Engineering, IEEE, 2017.
  12. N. Shone, T. N. Ngoc, V. D. Phai and Q. Shi, "A Deep Learning Approach to Network Intrusion Detection," in IEEE Transactions on Emerging Topics in Computational Intelligence, vol. 2, no. 1, pp. 41-50, Feb. 2018.
  13. He, L., “An improved intrusion detection based on neural network and fuzzy algorithm. Journal of Networks, vol. 9, issue 5, pp. 1274–1280, 2014.
  14. Hoque, M. S., Mukit, M. A. ,&Bikas, M. A. N., “An implementation of intrusion detection system using genetic algorithm”, International Journal of Network Security & Its Applications, vol 4, issue 2, pp. 109–120, 2012.
  15. Prasanta Gogoi, D.K. Bhattacharyya, B. Borah1 and Juga, K. Kalita, “MLH-IDS: A Multi-Level Hybrid Intrusion Detection Method”, The Computer Journal, Vol. 57 issue 4, pp. 602-623, 2014.

Downloads

Published

2020-08-30

Issue

Section

Research Articles

How to Cite

[1]
Sadhana Patidar, Priyanka Parihar, Chetan Agrawal, " Multilevel Intrusion Detection System with Affinity Clustering and Ensemble SVM" International Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 6, Issue 4, pp.522-529, July-August-2020. Available at doi : https://doi.org/10.32628/CSEIT206431