Skip to main content

2014 | OriginalPaper | Buchkapitel

Comparative Analysis and Research Issues in Classification Techniques for Intrusion Detection

verfasst von : Himadri Chauhan, Vipin Kumar, Sumit Pundir, Emmanuel S. Pilli

Erschienen in: Intelligent Computing, Networking, and Informatics

Verlag: Springer India

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Intrusion detection is one of the major research problems in network security. It is the process of monitoring and analyzing the events occurring in a computer system in order to detect different security violations. Mining approach can play a very important role in developing an intrusion detection system. In this paper, we present the comparison of different classification techniques to detect and classify intrusions into normal and abnormal behaviors. The algorithms used are J48, Naive Bayes, JRip, and OneR. We use the WEKA tool to evaluate these algorithms. The experiments and assessments of these methods are performed with NSL-KDD intrusion detection dataset. Our main aim was to show the comparison of the different classification algorithms and find out which algorithm will be most suitable for the intrusion detection. We also summarize the research challenges in classification process.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Lee, W., Stolfo, S.J., Mok, K.W.: A framework for constructing features and models for intrusion detection systems. ACM Trans. Inf. Syst. Secur. 3(4), 227–261 (2000)CrossRef Lee, W., Stolfo, S.J., Mok, K.W.: A framework for constructing features and models for intrusion detection systems. ACM Trans. Inf. Syst. Secur. 3(4), 227–261 (2000)CrossRef
2.
Zurück zum Zitat Zhu, D., Premkumar, G., Zhang, X., Chu, C.-H.: Data mining for network intrusion detection: a comparison of alternative methods. Decis. Sci. 32(4), 635–660 (2001)CrossRef Zhu, D., Premkumar, G., Zhang, X., Chu, C.-H.: Data mining for network intrusion detection: a comparison of alternative methods. Decis. Sci. 32(4), 635–660 (2001)CrossRef
3.
Zurück zum Zitat Kim, T., Yeo, S.S., Liu, Z., Lai, Y.: A data mining framework for building intrusion detection models based on IPv6. Adv. Inf. Secur. Assur. 5576, 608–618 (2009). Springer, Berlin Kim, T., Yeo, S.S., Liu, Z., Lai, Y.: A data mining framework for building intrusion detection models based on IPv6. Adv. Inf. Secur. Assur. 5576, 608–618 (2009). Springer, Berlin
4.
Zurück zum Zitat Lee, W., Stolfo, S.J.: Data mining approaches for intrusion detection. 7th USENIX Secur. Symp. 7(4), 635–660 (1998). San Antonio, TX Lee, W., Stolfo, S.J.: Data mining approaches for intrusion detection. 7th USENIX Secur. Symp. 7(4), 635–660 (1998). San Antonio, TX
5.
Zurück zum Zitat Gaol, F.L., Yi, S., Deng, F.: Research of network intrusion-detection system based on data mining. Recent Progress Data Eng. Internet Technol. 157, 141–148 (2012). Springer, BerlinCrossRef Gaol, F.L., Yi, S., Deng, F.: Research of network intrusion-detection system based on data mining. Recent Progress Data Eng. Internet Technol. 157, 141–148 (2012). Springer, BerlinCrossRef
6.
Zurück zum Zitat Warrender, C., Forrest, S., Pearlmutter, B.: Detecting intrusions using system calls: alternative data models. IEEE Symposium on Security and Privacy, pp. 133–145, (1999) Warrender, C., Forrest, S., Pearlmutter, B.: Detecting intrusions using system calls: alternative data models. IEEE Symposium on Security and Privacy, pp. 133–145, (1999)
7.
Zurück zum Zitat Schultz, M.G., Zadok, E., Stolfo, S.J., Eskin, E.: Data mining methods for detection of new malicious executables. IEEE Symposium on Security and Privacy, Columbia University, pp. 38–49. (2001) Schultz, M.G., Zadok, E., Stolfo, S.J., Eskin, E.: Data mining methods for detection of new malicious executables. IEEE Symposium on Security and Privacy, Columbia University, pp. 38–49. (2001)
8.
Zurück zum Zitat Ertoz, L., Eilertson, E., Lazarevic, A., Tan, P., Kumar, V., Srivatsa, J., Dokas, P.: MINDS—Minnesota Intrusion Detection System, Next Generation Data Mining. MIT Press, Cambridge (2004) Ertoz, L., Eilertson, E., Lazarevic, A., Tan, P., Kumar, V., Srivatsa, J., Dokas, P.: MINDS—Minnesota Intrusion Detection System, Next Generation Data Mining. MIT Press, Cambridge (2004)
9.
Zurück zum Zitat Nazer, G.M., Selvakumar, A.L.: Intelligent data mining techniques for intrusion detection models on network. Eur. J. Sci. Res. 71(1), 36–45 (2012) Nazer, G.M., Selvakumar, A.L.: Intelligent data mining techniques for intrusion detection models on network. Eur. J. Sci. Res. 71(1), 36–45 (2012)
10.
Zurück zum Zitat Hwang, T., Lee, T., Lee, Y.: A three-tier IDS via data mining approach. 3rd annual ACM workshop on Mining network data, pp. 1–6. (2007) Hwang, T., Lee, T., Lee, Y.: A three-tier IDS via data mining approach. 3rd annual ACM workshop on Mining network data, pp. 1–6. (2007)
11.
Zurück zum Zitat Lippmann, R., Haines, J.W., Fried, D.J., Korba, J., Das, K.: The 1999 DARPA off-line intrusion detection evaluation. Comput. Netw. 34(4), 579–595 (2000)CrossRef Lippmann, R., Haines, J.W., Fried, D.J., Korba, J., Das, K.: The 1999 DARPA off-line intrusion detection evaluation. Comput. Netw. 34(4), 579–595 (2000)CrossRef
12.
Zurück zum Zitat Olusola, A.A., Oladele, A.S., Abosede, D.O.: Analysis of KDD’99 intrusion detection dataset for selection of relevance features. World Congress on Engineering and Computer Science, vol. 1. San Francisco, USA, 20–22 Oct 2010 Olusola, A.A., Oladele, A.S., Abosede, D.O.: Analysis of KDD’99 intrusion detection dataset for selection of relevance features. World Congress on Engineering and Computer Science, vol. 1. San Francisco, USA, 20–22 Oct 2010
13.
Zurück zum Zitat Tavallaee, M., Bagheri, E., Wei, L., Ghorbani, A.A.: A detailed analysis of the KDD CUP 99 data set. IEEE Symposium on Computational Intelligence for Security and Defense Applications, CISDA, pp. 1–6. (2009) Tavallaee, M., Bagheri, E., Wei, L., Ghorbani, A.A.: A detailed analysis of the KDD CUP 99 data set. IEEE Symposium on Computational Intelligence for Security and Defense Applications, CISDA, pp. 1–6. (2009)
14.
Zurück zum Zitat Subramanian, S., Srinivasan, V.B., Ramasa, C.: Study on classification algorithms for network intrusion systems. J. Commun. Comput. 9, 1242–1246 (2012) Subramanian, S., Srinivasan, V.B., Ramasa, C.: Study on classification algorithms for network intrusion systems. J. Commun. Comput. 9, 1242–1246 (2012)
16.
Zurück zum Zitat Kalyani, G., Lakshmi, A.J.: Performance assessment of different classification techniques for intrusion detection. IOSR J. Comput. Eng. (IOSRJCE) 7(5), 25–29 (2012)CrossRef Kalyani, G., Lakshmi, A.J.: Performance assessment of different classification techniques for intrusion detection. IOSR J. Comput. Eng. (IOSRJCE) 7(5), 25–29 (2012)CrossRef
17.
Zurück zum Zitat Reddy, E.K., Iaeng, M., Reddy, V.N., Rajulu, P.G.: A study of intrusion detection in data mining. World Congress on Engineering (WCE), pp 6–8. London, 3 July 2011 Reddy, E.K., Iaeng, M., Reddy, V.N., Rajulu, P.G.: A study of intrusion detection in data mining. World Congress on Engineering (WCE), pp 6–8. London, 3 July 2011
18.
Zurück zum Zitat Neethu, B.: Classification of intrusion detection dataset using machine learning approaches. Int. J. Electron. Comput. Sci. Eng. 1, 1044–1051 (2012) Neethu, B.: Classification of intrusion detection dataset using machine learning approaches. Int. J. Electron. Comput. Sci. Eng. 1, 1044–1051 (2012)
19.
Zurück zum Zitat Srinivasulu, P., Nagaraju, D., Kumar, P.R., Rao, K.N.: Classifying the network intrusion attacks using data mining classification methods and their performance comparison. Int. J. Comput. Sci. Network Secur. (IJCSNS) 9(6), 11–18 (2009) Srinivasulu, P., Nagaraju, D., Kumar, P.R., Rao, K.N.: Classifying the network intrusion attacks using data mining classification methods and their performance comparison. Int. J. Comput. Sci. Network Secur. (IJCSNS) 9(6), 11–18 (2009)
20.
Zurück zum Zitat Quinlan, J.R.: C4.5: Programs for Machine Learning. Morgan Kaufmann Publishers, Los Altos (1993) Quinlan, J.R.: C4.5: Programs for Machine Learning. Morgan Kaufmann Publishers, Los Altos (1993)
22.
Zurück zum Zitat S. Garner: Weka: the Waikato environment for knowledge analysis. Computer Science Research Students Conference, pp. 57–64, Citeseer, New Zealand, (1995) S. Garner: Weka: the Waikato environment for knowledge analysis. Computer Science Research Students Conference, pp. 57–64, Citeseer, New Zealand, (1995)
23.
Zurück zum Zitat Domingos, P., Pazzani, M.: On the optimality of the simple Bayesian classifier under zero-one loss. Mach. Learn. 29(2&3), 103–130 (1997)CrossRef Domingos, P., Pazzani, M.: On the optimality of the simple Bayesian classifier under zero-one loss. Mach. Learn. 29(2&3), 103–130 (1997)CrossRef
24.
Zurück zum Zitat Cohen, W.W.: Fast effective rule induction. Twelfth International Conference on Machine Learning, pp. 115–123, (1995) Cohen, W.W.: Fast effective rule induction. Twelfth International Conference on Machine Learning, pp. 115–123, (1995)
Metadaten
Titel
Comparative Analysis and Research Issues in Classification Techniques for Intrusion Detection
verfasst von
Himadri Chauhan
Vipin Kumar
Sumit Pundir
Emmanuel S. Pilli
Copyright-Jahr
2014
Verlag
Springer India
DOI
https://doi.org/10.1007/978-81-322-1665-0_68