Skip to main content
Erschienen in: Artificial Intelligence Review 3/2019

04.07.2017

A hybrid intrusion detection system (HIDS) based on prioritized k-nearest neighbors and optimized SVM classifiers

verfasst von: Ahmed I. Saleh, Fatma M. Talaat, Labib M. Labib

Erschienen in: Artificial Intelligence Review | Ausgabe 3/2019

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Intrusion Detection System (IDS) is an effective security tool that helps preventing unauthorized access to network resources through analyzing the network traffic. However, due to the large amount of data flowing over the network, effective real time intrusion detection is almost impossible. The goal of this paper is to design a Hybrid IDS (HIDS) that can be successfully employed in a real time manner and suitable for resolving the multi-class classification problem. HIDS relies on a Naïve Base feature selection (NBFS) technique, which is used to reduce the dimensionality of sample data. Moreover, HIDS has another pioneering issue that other techniques do not have, which is the outlier rejection. Outliers are noisy input samples that can lead to high rate of misclassification if they are applied for model training. Rejecting outliers has been accomplished through applying a distance based methodology to choose the most informative training examples, which are then used to train an Optimized Support Vector Machines (OSVM). Afterward, OSVM is employed for rejecting outliers. Finally, after outlier rejection, HIDS can successfully detect attacks through applying a Prioritized K-Nearest Neighbors (PKNN) classifier. Hence, HIDS is a triple edged strategy as it has three main contributions, which are: (i) NBFS, which has been employed for dimensionality reduction, (ii) OSVM, which is applied for outlier rejection, and (iii) PKNN, which is used for detecting input attacks. HIDS has been compared against recent techniques using three well-known intrusion detection datasets: KDD Cup ’99, NSL-KDD and Kyoto 2006+ datasets. HIDS has the ability to quickly detect attacks and accordingly can be employed for real time intrusion detection. Thanks to OSVM and PKNN, HIDS performed high detection rates specifically for the attacks which are rare such as R2L and U2R. PKNN is also suitable for resolving the multi-label classification problem.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literatur
Zurück zum Zitat Aksoy S (2008) Feature reduction and selection. Department of Computer Engineering, Bilkent University, CS 551 Aksoy S (2008) Feature reduction and selection. Department of Computer Engineering, Bilkent University, CS 551
Zurück zum Zitat Al-mamory SO, Jassim FS (2013) Evaluation of different data mining algorithms with KDD CUP 99 data set. J Babylon Univ Pure Appl Sci 21(8):2663–2681 Al-mamory SO, Jassim FS (2013) Evaluation of different data mining algorithms with KDD CUP 99 data set. J Babylon Univ Pure Appl Sci 21(8):2663–2681
Zurück zum Zitat Amrita MA (2013) Performance analysis of different feature selection methods in intrusion detection. Int J Sci Technol Res 2(6):225–231 Amrita MA (2013) Performance analysis of different feature selection methods in intrusion detection. Int J Sci Technol Res 2(6):225–231
Zurück zum Zitat Atefi K, Yahya S, Dak AY, Atefi A (2013) A hybrid intrusion detection system based on different machine learning algorithms. In: Proceedings of the 4th international conference on computing and informatics, Sarawak, Malaysia. pp 312–320 Atefi K, Yahya S, Dak AY, Atefi A (2013) A hybrid intrusion detection system based on different machine learning algorithms. In: Proceedings of the 4th international conference on computing and informatics, Sarawak, Malaysia. pp 312–320
Zurück zum Zitat Bin Y, Qiao Y, Xin XW et al (2002) Anomaly intrusion detection method based on HMM[J]. IEEE Electron Lett 38:663–664CrossRef Bin Y, Qiao Y, Xin XW et al (2002) Anomaly intrusion detection method based on HMM[J]. IEEE Electron Lett 38:663–664CrossRef
Zurück zum Zitat Chitrakar R, Huang C (2014) Selection of candidate support vectors in incremental SVM for network intrusion detection. Comput Secur 45:231–241CrossRef Chitrakar R, Huang C (2014) Selection of candidate support vectors in incremental SVM for network intrusion detection. Comput Secur 45:231–241CrossRef
Zurück zum Zitat Davy M, Gretton A, Doucet A, Rayner PJW (2002) Optimized support vector machines for nonstationary signal classification. IEEE Signal Process Lett 9(12):442–445CrossRef Davy M, Gretton A, Doucet A, Rayner PJW (2002) Optimized support vector machines for nonstationary signal classification. IEEE Signal Process Lett 9(12):442–445CrossRef
Zurück zum Zitat Devarakondaa N, Pamidib S, Kumari VV, Govardhan A (2011) Intrusion detection system using bayesian network and hidden Markov model. In: Selection and/or peer-review under responsibility of C3IT. Elsevier Ltd Devarakondaa N, Pamidib S, Kumari VV, Govardhan A (2011) Intrusion detection system using bayesian network and hidden Markov model. In: Selection and/or peer-review under responsibility of C3IT. Elsevier Ltd
Zurück zum Zitat Di Martino S, Ferrucci F, Gravino C, Sarro F (2011) A genetic algorithm to configure support vector machines for predicting fault-prone components. In: Product-focused software process improvement. Springer, pp 247–261 Di Martino S, Ferrucci F, Gravino C, Sarro F (2011) A genetic algorithm to configure support vector machines for predicting fault-prone components. In: Product-focused software process improvement. Springer, pp 247–261
Zurück zum Zitat Feng W, Zhang Q, Hu G, Huang JX (2014) Mining network data for intrusion detection through combining SVMs with ant colony networks. Future Gener Comput Syst 37:127–140CrossRef Feng W, Zhang Q, Hu G, Huang JX (2014) Mining network data for intrusion detection through combining SVMs with ant colony networks. Future Gener Comput Syst 37:127–140CrossRef
Zurück zum Zitat Frohlich H, Chapelle O (2003) Feature selection for support vector machines by means of genetic algorithm. In: Proceedings of the 15th IEEE international conference on tools with artificial intelligence, Sacramento, 3–5 November. pp 142–148 Frohlich H, Chapelle O (2003) Feature selection for support vector machines by means of genetic algorithm. In: Proceedings of the 15th IEEE international conference on tools with artificial intelligence, Sacramento, 3–5 November. pp 142–148
Zurück zum Zitat Gutierrez-Osuna R (2002) Pattern analysis for machine olfaction: a review. IEEE Sens J 2:189–202CrossRef Gutierrez-Osuna R (2002) Pattern analysis for machine olfaction: a review. IEEE Sens J 2:189–202CrossRef
Zurück zum Zitat Hsu CW, Chang CC, Lin CJ (2003) A practical guide to support vector classification, Technical report. Department of Computer Science and Information Engineering, University of National Taiwan, Taipei. pp 1–12 Hsu CW, Chang CC, Lin CJ (2003) A practical guide to support vector classification, Technical report. Department of Computer Science and Information Engineering, University of National Taiwan, Taipei. pp 1–12
Zurück zum Zitat Kayacik HG, Zincir-Heywood AN, Heywood MI (2005) Selecting features for intrusion detection: a feature relevance analysis on KDD 99 intrusion detection datasets. In: Proceedings of the third annual conference on privacy, security and trust , October 12–14, 2005, The Fairmont Algonquin, St. Andrews, New Brunswick, Canada Kayacik HG, Zincir-Heywood AN, Heywood MI (2005) Selecting features for intrusion detection: a feature relevance analysis on KDD 99 intrusion detection datasets. In: Proceedings of the third annual conference on privacy, security and trust , October 12–14, 2005, The Fairmont Algonquin, St. Andrews, New Brunswick, Canada
Zurück zum Zitat Kennedy J, Eberhart R (1995) Particle swarm optimization. In: Proceedings of IEEE international conference on neural networks, vol IV. pp 1942–1948 Kennedy J, Eberhart R (1995) Particle swarm optimization. In: Proceedings of IEEE international conference on neural networks, vol IV. pp 1942–1948
Zurück zum Zitat Kuang F, Xu W, Zhang S (2014) A novel hybrid KPCA and SVM with GA model for intrusion detection. Appl Soft Comput 18:178–184CrossRef Kuang F, Xu W, Zhang S (2014) A novel hybrid KPCA and SVM with GA model for intrusion detection. Appl Soft Comput 18:178–184CrossRef
Zurück zum Zitat Kuang F, Zhang S, Jin Z, Xu W (2015) A novel SVM by combining kernel principal component analysis and improved chaotic particle swarm optimization for intrusion detection. Soft Comput 21:1–13 Kuang F, Zhang S, Jin Z, Xu W (2015) A novel SVM by combining kernel principal component analysis and improved chaotic particle swarm optimization for intrusion detection. Soft Comput 21:1–13
Zurück zum Zitat Le Thi HA, Le AV, Vo XT, Zidna A (2014) A filter based feature selection approach in MSVM using DCA and its application in network intrusion detection. In: Nguyen NT, Attachoo B, Trawiński B, Somboonviwat K (eds) Intelligent information and database systems. ACIIDS 2014. Lecture notes in computer science, vol 8398. Springer, Cham Le Thi HA, Le AV, Vo XT, Zidna A (2014) A filter based feature selection approach in MSVM using DCA and its application in network intrusion detection. In: Nguyen NT, Attachoo B, Trawiński B, Somboonviwat K (eds) Intelligent information and database systems. ACIIDS 2014. Lecture notes in computer science, vol 8398. Springer, Cham
Zurück zum Zitat Liu H, Yu L (2005) Towards integrating feature selection algorithms for classification and clustering. IEEE Trans Knowl Data Eng 17:491–502CrossRef Liu H, Yu L (2005) Towards integrating feature selection algorithms for classification and clustering. IEEE Trans Knowl Data Eng 17:491–502CrossRef
Zurück zum Zitat Mukkamala S, Janoski G, Sung AH (2002) Intrusion detection using neural networks and support vector machines. In: Proceedings of IEEE international joint conference on neural networks, vol 2. Honolulu, pp 1702–1707 Mukkamala S, Janoski G, Sung AH (2002) Intrusion detection using neural networks and support vector machines. In: Proceedings of IEEE international joint conference on neural networks, vol 2. Honolulu, pp 1702–1707
Zurück zum Zitat Olusola AA, Oladele AS, Abosede DO (2010) Analysis of KDD’99 intrusion detection dataset for selection of relevance features. In: Proceedings of the world congress on engineering and computer science, vol 1 Olusola AA, Oladele AS, Abosede DO (2010) Analysis of KDD’99 intrusion detection dataset for selection of relevance features. In: Proceedings of the world congress on engineering and computer science, vol 1
Zurück zum Zitat Roobaert D, Karakoulas G, Chawla NV (2006) Information gain, correlation and support vector machines. In: Feature extraction. Springer, Berlin, pp 463–470 Roobaert D, Karakoulas G, Chawla NV (2006) Information gain, correlation and support vector machines. In: Feature extraction. Springer, Berlin, pp 463–470
Zurück zum Zitat Saleh AI, El Desouky AI, Ali SH (2015) Promoting the performance of vertical recommendation systems by applying new classification techniques. Knowl Based Syst 75:192–223CrossRef Saleh AI, El Desouky AI, Ali SH (2015) Promoting the performance of vertical recommendation systems by applying new classification techniques. Knowl Based Syst 75:192–223CrossRef
Zurück zum Zitat Song J, Takakura H, Okabe Y, Eto M, Inoue D, Nakao K (2011) Statistical analysis of honeypot data and building of Kyoto 2006+ dataset for NIDS evaluation. In: Proceedings of the 1st workshop on building analysis datasets and gathering experience returns for security, Salzburg, 10–13 April 2011. pp 29–36. doi:10.1145/1978672.1978676 Song J, Takakura H, Okabe Y, Eto M, Inoue D, Nakao K (2011) Statistical analysis of honeypot data and building of Kyoto 2006+ dataset for NIDS evaluation. In: Proceedings of the 1st workshop on building analysis datasets and gathering experience returns for security, Salzburg, 10–13 April 2011. pp 29–36. doi:10.​1145/​1978672.​1978676
Zurück zum Zitat Sravani K, Srinivasu P (2014) Comparative study of machine learning algorithm for intrusion detection system. In: Satapathy S, Udgata S, Biswal B (eds) Proceedings of the international conference on frontiers of intelligent computing: theory and applications (FICTA) 2013. Advances in intelligent systems and computing, vol 247. Springer, Cham Sravani K, Srinivasu P (2014) Comparative study of machine learning algorithm for intrusion detection system. In: Satapathy S, Udgata S, Biswal B (eds) Proceedings of the international conference on frontiers of intelligent computing: theory and applications (FICTA) 2013. Advances in intelligent systems and computing, vol 247. Springer, Cham
Zurück zum Zitat Subaira AS, Anitha P (2013) An efficient classification mechanism for network intrusion detection system based on data mining techniques: a survey. ISSN: 1694-2108 Subaira AS, Anitha P (2013) An efficient classification mechanism for network intrusion detection system based on data mining techniques: a survey. ISSN: 1694-2108
Zurück zum Zitat Tan Z, Nagar UT, He X, Liu RP, Wang S, Hu J (2014) Enhancing big data security with collaborative intrusion detection. IEEE Cloud Comput 3(3):27–33CrossRef Tan Z, Nagar UT, He X, Liu RP, Wang S, Hu J (2014) Enhancing big data security with collaborative intrusion detection. IEEE Cloud Comput 3(3):27–33CrossRef
Zurück zum Zitat Wang GP, Chen SY, Liu J (2015) Anomaly-based intrusion detection using multiclass-SVM with parameters optimized by PSO. Int J Secur Appl 9:227–242 Wang GP, Chen SY, Liu J (2015) Anomaly-based intrusion detection using multiclass-SVM with parameters optimized by PSO. Int J Secur Appl 9:227–242
Zurück zum Zitat Warrender C, Forrest S, Pearlmutter B (1999) Detecting intrusion using system calls: alternative data models. In: IEEE symposium on security and privacy. IEEE Computer Society Warrender C, Forrest S, Pearlmutter B (1999) Detecting intrusion using system calls: alternative data models. In: IEEE symposium on security and privacy. IEEE Computer Society
Zurück zum Zitat Yi Y, Wu J, Xu W (2011) Incremental SVM based on reserved set for network intrusion detection. Expert Syst Appl 38:7698–7707CrossRef Yi Y, Wu J, Xu W (2011) Incremental SVM based on reserved set for network intrusion detection. Expert Syst Appl 38:7698–7707CrossRef
Zurück zum Zitat Yu L, Liu H (2003) Feature selection for high-dimensional data: a fast correlation-based filter solution. In: Machine learning-international workshop then conference, vol 20. p 856 Yu L, Liu H (2003) Feature selection for high-dimensional data: a fast correlation-based filter solution. In: Machine learning-international workshop then conference, vol 20. p 856
Zurück zum Zitat Zhang M, Yao JT (2004) A rough sets based approach to feature selection. In: IEEE annual meeting of the fuzzy information, processing NAFIPS’04, vol 1. IEEE, pp 434–439 Zhang M, Yao JT (2004) A rough sets based approach to feature selection. In: IEEE annual meeting of the fuzzy information, processing NAFIPS’04, vol 1. IEEE, pp 434–439
Metadaten
Titel
A hybrid intrusion detection system (HIDS) based on prioritized k-nearest neighbors and optimized SVM classifiers
verfasst von
Ahmed I. Saleh
Fatma M. Talaat
Labib M. Labib
Publikationsdatum
04.07.2017
Verlag
Springer Netherlands
Erschienen in
Artificial Intelligence Review / Ausgabe 3/2019
Print ISSN: 0269-2821
Elektronische ISSN: 1573-7462
DOI
https://doi.org/10.1007/s10462-017-9567-1

Weitere Artikel der Ausgabe 3/2019

Artificial Intelligence Review 3/2019 Zur Ausgabe