Improving Intrusion Detection by the Automated Generation of Detection Rules

作者: Abdulrazaq Almutairi , David Parish

DOI: 10.20533/IJICR.2042.4655.2014.0062

关键词:

摘要: Rule Based Detection Systems have been successful in preventing attacks on network resources, but suffer a problem that they are not adaptable cases where new made i.e. need human intervention for investigating attacks. This paper proposes the creation of predictive intrusion detection model is based usage classification techniques such as decision tree, Naive Bayes, neural network, and fuzzy lo gic to generate rules. The proposed this consists two stages. first stage uses either Decision tree (J48 C4.5) or Bayes classifier results obtained experiments while second hybrid module both (MLP) logic. Training evaluation phases used randomly selected connections subset KDD’99 data set. A set features has extracted from those using algorithm. shows how system trained detailing parameters affect training process; it also details process including false positive rates.

参考文章(20)
G. A. Vijayalksmi, S. Rajashekaran, Neural Networks, Fuzzy Logic and Genetic Algorithms Prentice-Hall of India Pvt.Ltd. ,(2004)
Hung-Jen Liao, Chun-Hung Richard Lin, Ying-Chih Lin, Kuang-Yuan Tung, Review: Intrusion detection system: A comprehensive review Journal of Network and Computer Applications. ,vol. 36, pp. 16- 24 ,(2013) , 10.1016/J.JNCA.2012.09.004
G.A. Vijayalakshmi Pai, Sanguthevar Rajasekaran, NEURAL NETWORKS, FUZZY LOGIC, AND GENETIC ALGORITHMS : SYNTHESIS AND APPLICATIONS ,(2013)
M. Hall, Correlation-based Feature Selection for Machine Learning PhD Thesis, Waikato Univer-sity. ,(1998)
Martin Anthony, Peter L Bartlett, Peter L Bartlett, Neural Network Learning: Theoretical Foundations ,(1999)
Przemyslaw Kukielka, Zbigniew Kotulski, Adaptation of the neural network-based IDS to new attacks detection arXiv: Cryptography and Security. ,(2010)
Martin Roesch, Snort - Lightweight Intrusion Detection for Networks usenix large installation systems administration conference. pp. 229- 238 ,(1999)
Jonathan J. Davis, Andrew J. Clark, Data preprocessing for anomaly based network intrusion detection: A review Computers & Security. ,vol. 30, pp. 353- 375 ,(2011) , 10.1016/J.COSE.2011.05.008
Ray-I Chang, Liang-Bin Lai, Wen-De Su, Jen-Chieh Wang, Jen-Shaing Kouh, INTRUSION DETECTION BY BACKPROPAGATION NEURAL NETWORKS WITH SAMPLE-QUERY AND ATTRIBUTE-QUERY International Journal of Computational Intelligence Research. ,vol. 3, pp. 6- 10 ,(2007) , 10.5019/J.IJCIR.2007.76