REAL-TIME INTELLIGENT MULTILAYER ATTACK CLASSIFICATION SYSTEM

作者: T Subbulakshmi , SG Keerthiga , R Dharini , S Mercy Shalinie

DOI: 10.21917/IJSC.2014.0097

关键词:

摘要: Intrusion Detection Systems (IDS) takes the lion’s share of current security infrastructure. intrusions is vital for initiating defensive procedures. detection was done by statistical and distance based methods. A threshold value used in these methods to indicate level normalcy. When network traffic crosses normalcy then above which it flagged as anomalous. there are occurrences new intrusion events increasingly a key part system security, techniques cannot detect them. To overcome this issue, learning helps identifying activities computer system. The objective proposed designed paper classify using an Intelligent Multi Layered Attack Classification System (IMLACS) detecting classifying with improved classification accuracy. intelligent multi layered approach contains three layers. first layer involves Binary Support Vector Machine normal attack. second neural attacks into classes attacks. third fuzzy inference various subclasses. IMLACS can be able behavior networks since better set rules. Feature selection also improve time detection. experimental results show that achieves Rate 97.31%.

参考文章(24)
T. Subbulakshmi, S. Mercy Shalinie, C. Suneel Reddy, A. Ramamoorthi, Detection and Classification of DDoS Attacks Using Fuzzy Inference System Recent Trends in Network Security and Applications. pp. 242- 252 ,(2010) , 10.1007/978-3-642-14478-3_25
Nawa Ngamwitthayanon, Naruemon Wattanapongsakorn, David W. Coit, Investigation of Fuzzy Adaptive Resonance Theory in Network Anomaly Intrusion Detection international symposium on neural networks. pp. 208- 217 ,(2009) , 10.1007/978-3-642-01510-6_24
Ajith Abraham, Ravi Jain, Soft Computing Models for Network Intrusion Detection Systems Classification and Clustering for Knowledge Discovery. pp. 191- 207 ,(2004)
Richard P Lippmann, Robert K Cunningham, Improving intrusion detection performance using keyword selection and neural networks recent advances in intrusion detection. ,vol. 34, pp. 597- 603 ,(2000) , 10.1016/S1389-1286(00)00140-7
Phurivit Sangkatsanee, Naruemon Wattanapongsakorn, Chalermpol Charnsripinyo, Practical real-time intrusion detection using machine learning approaches Computer Communications. ,vol. 34, pp. 2227- 2235 ,(2011) , 10.1016/J.COMCOM.2011.07.001
Xuan Dau Hoang, Jiankun Hu, Peter Bertok, A program-based anomaly intrusion detection scheme using multiple detection engines and fuzzy inference Journal of Network and Computer Applications. ,vol. 32, pp. 1219- 1228 ,(2009) , 10.1016/J.JNCA.2009.05.004
Wenke Lee, Salvatore J. Stolfo, Kui W. Mok, Mining in a data-flow environment: experience in network intrusion detection knowledge discovery and data mining. pp. 114- 124 ,(1999) , 10.1145/312129.312212
Joong-Hee Lee, Jong-Hyouk Lee, Seon-Gyoung Sohn, Jong-Ho Ryu, Tai-Myoung Chung, Effective Value of Decision Tree with KDD 99 Intrusion Detection Datasets for Intrusion Detection System international conference on advanced communication technology. ,vol. 2, pp. 1170- 1175 ,(2008) , 10.1109/ICACT.2008.4493974