Evaluation effectiveness of hybrid IDS using Snort with Naïve Bayes to detect attacks

作者: Safwan Mawlood Hussein , Fakariah Hani Mohd Ali , Zolidah Kasiran

DOI: 10.1109/DICTAP.2012.6215386

关键词:

摘要: The enormous number of attacks over the Internet nowadays makes information under potential violation. Intrusion Detection System (IDS) is used as second line defense to observe suspicious actions going on in computers or network devices. IDS have two approaches by using only one misuse anomaly can be detected. This research proposed hybrid integrated signature based (Snort) with (Naive Bayes) enhance system security detect attacks. Knowledge Discovery Data Mining (KDD) CUP 99 dataset and Waikato Environment for Analysis (WEKA) program testing IDS. Accuracy, detection rate, time build model false alarm rate were parameters evaluate performance between Snort Naive Bayes, J48graft Bayes Net. result shows good algorithm.

参考文章(10)
Salem Benferhat, Karim Tabia, Integrating Anomaly-Based Approach into Bayesian Network Classifiers international conference on e business. ,vol. 48, pp. 127- 139 ,(2008) , 10.1007/978-3-642-05197-5_9
Elvis Tombini, Hervé Debar, Ludovic Mé, Mireille Ducassé, A serial combination of anomaly and misuse IDSes applied to HTTP traffic annual computer security applications conference. pp. 428- 437 ,(2004) , 10.1109/CSAC.2004.4
Wojciech Tylman, Detecting computer intrusions with Bayesian networks intelligent data engineering and automated learning. pp. 82- 91 ,(2009) , 10.1007/978-3-642-04394-9_11
M Ali Aydın, A Halim Zaim, K Gökhan Ceylan, None, A hybrid intrusion detection system design for computer network security Computers & Electrical Engineering. ,vol. 35, pp. 517- 526 ,(2009) , 10.1016/J.COMPELECENG.2008.12.005
Su-Yun Wu, Ester Yen, Data mining-based intrusion detectors Expert Systems With Applications. ,vol. 36, pp. 5605- 5612 ,(2009) , 10.1016/J.ESWA.2008.06.138
Duanyang Zhao, Qingxiang Xu, Zhilin Feng, Analysis and Design for Intrusion Detection System Based on Data Mining 2010 Second International Workshop on Education Technology and Computer Science. ,vol. 2, pp. 339- 342 ,(2010) , 10.1109/ETCS.2010.478
Z Muda, W Yassin, MN Sulaiman, NI Udzir, None, Intrusion detection based on K-Means clustering and Naïve Bayes classification international conference on information technology. pp. 1- 6 ,(2011) , 10.1109/CITA.2011.5999520
Alexander Hofmann, Bernhard Sick, Online Intrusion Alert Aggregation with Generative Data Stream Modeling IEEE Transactions on Dependable and Secure Computing. ,vol. 8, pp. 282- 294 ,(2011) , 10.1109/TDSC.2009.36
Cristina Amza, Catalin Leordeanu, Valentin Cristea, Hybrid network Intrusion Detection international conference on intelligent computer communication and processing. pp. 503- 510 ,(2011) , 10.1109/ICCP.2011.6047923