Intrusion-Miner: A Hybrid Classifier for Intrusion Detection using Data Mining
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2019, Vol 10, Issue 4
Abstract
With the rapid growth and usage of internet, number of network attacks have increase dramatically within the past few years. The problem facing in nowadays is to observe these attacks efficiently for security concerns because of the value of data. Consequently, it is important to monitor and handle these attacks and intrusion detection system (IDS) has potentially diagnostic ability to handle these attacks to secure the network. Numerous intrusion detection approaches are presented but the main hindrance is their performance which can be improved by increasing detection rate as well as decreasing false positive rates. Optimizing the performance of IDS is very serious issue and challenging fact that gets more attention from the research community. In this paper, we proposed a hybrid classification approach ‘Intrusion-Miner’ with the help of two classifier algorithm for network anomaly detection to get optimum result and make it possible to detect network attacks. Thus, principal component analysis (PCA) and Fisher Discriminant Ratio (FDR) have been implemented for the feature selection and noise removal. This hybrid approach is compared with J48, Bayesnet, JRip, SMO, IBK and evaluate the performance using KDD99 dataset. Experimental result revealed that the precision of the proposed approach is measured as 96.1 % with low false positive and high false negative rate as compare to other state-of-the-art algorithm. The simulation result evaluation shows that perceptible progress and real-time intrusion detection can be attained as we apply the suggested models to identify diverse kinds of network attacks.
Authors and Affiliations
Samra Zafar, Muhammad Kamran, Xiaopeng Hu
A Bayesian Approach to Predicting Water Supply and Rehabilitation of Water Distribution Networks
Water distribution network (WDN) consists of several elements the main ones: pipes and valves. The work developed in this article focuses on a water supply prediction in the short and long term. To this end, reliability...
Comparison between Commensurate and Non-commensurate Fractional Systems
This article deals with fractional systems that rep-resent better physical process and guarantee a very small number of parameters that can reduces the computation time. It focuses in particular on the state-space repres...
Enhanced Mutual Authenticated Key Agreement Protocol for Anonymous Roaming Service in Global Mobility Networks
With the rapid development of mobile intelligent terminals, users can enjoy ubiquitous life in global mobility networks (GLOMONET). It is essential to secure user information for providing secure roaming service in GLOMO...
Reviewing Diagnosis Solutions for Valid Product Configurations in the Automated Analysis of Feature Models
A Feature Model (FM) is an information model to represent commonalities and variabilities for all the products of a Software Product Line (SPL). The complexity and large-scale of real feature models makes their manual an...
Security Analysis of Image Cryptosystem Using Stream Cipher Algorithm with Nonlinear Filtering Function
In this work a new algorithm for encryption image is introduced. This algorithm makes it possible to cipher and decipher images by guaranteeing a maximum security. The algorithm introduced is based on stream cipher with...