Skip to main content

2014 | OriginalPaper | Buchkapitel

Data Mining Approach for Developing Various Models Based on Types of Attack and Feature Selection as Intrusion Detection Systems (IDS)

verfasst von : H. S. Hota, Akhilesh Kumar Shrivas

Erschienen in: Intelligent Computing, Networking, and Informatics

Verlag: Springer India

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Information security is one of the important issues to protect data or information from unauthorized access. Classification techniques play very important role in information security to classify data as legitimate or normal data. Nowadays, network traffic includes large amount of irrelevant information that increases complexity of classifier and affect the classification result, so we need to develop robust model that can classify the data with high accuracy. In this paper, various types of classification techniques are applied on NSL-KDD data with Tenfold cross-validation technique in two different viewpoints. First, the classification techniques are applied for two class problem as binary classification (normal and attack), and second, it is applied for five class problem as multiclass classification. Empirical result shows that random forest technique outperforms in case of two class problem as well as five class problem on NSL-KDD data set. Due to large amount of redundant data, we have also applied feature selection techniques on random forest tree model which is best model as binary classifier as well as multiclass classifier. Model produces highest accuracy with 15 features in case of binary classification. Performance of the various models are also evaluated using other performance measures like true-positive rate (TPR), false-positive rate (FPR), precision, F-measure and receiver operating characteristic (ROC) curve and the results are found to be satisfactory.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Koc, L., et al.: A network intrusion detection system based on hidden naive bayes multiclass classifier. J. Expert Syst. Appl. 39, 13492–13500 (2012)CrossRef Koc, L., et al.: A network intrusion detection system based on hidden naive bayes multiclass classifier. J. Expert Syst. Appl. 39, 13492–13500 (2012)CrossRef
2.
Zurück zum Zitat Sun, M., et al.: A new method of feature selection for flow classification. International Conference on Applied Physics and Industrial Engineering, vol. 24, pp. 1729–1736 (2012) Sun, M., et al.: A new method of feature selection for flow classification. International Conference on Applied Physics and Industrial Engineering, vol. 24, pp. 1729–1736 (2012)
3.
Zurück zum Zitat Mukherjee, S., et al.: Intrusion detection using bayes classifier with feature reduction. Procedia Technol. 4, 119–128 (2012)CrossRef Mukherjee, S., et al.: Intrusion detection using bayes classifier with feature reduction. Procedia Technol. 4, 119–128 (2012)CrossRef
5.
Zurück zum Zitat Pujari, A.K.: Data mining techniques, 4th edn. Universities Press (India) Private Limited (2001) Pujari, A.K.: Data mining techniques, 4th edn. Universities Press (India) Private Limited (2001)
6.
Zurück zum Zitat Cios, K., et al.: Data mining methods for knowledge discovery, 3rd edn. Kluwer Academic Publishers, Heidelberg (2000)MATH Cios, K., et al.: Data mining methods for knowledge discovery, 3rd edn. Kluwer Academic Publishers, Heidelberg (2000)MATH
7.
Zurück zum Zitat Han, J., Kamber, M.: Data mining concepts and techniques, 2nd edn. Morgan Kaufmann, San Francisco (2006)MATH Han, J., Kamber, M.: Data mining concepts and techniques, 2nd edn. Morgan Kaufmann, San Francisco (2006)MATH
8.
Zurück zum Zitat Wang, J.: Data Mining: opportunities and challenges. Idea Group, USA (2003)CrossRef Wang, J.: Data Mining: opportunities and challenges. Idea Group, USA (2003)CrossRef
Metadaten
Titel
Data Mining Approach for Developing Various Models Based on Types of Attack and Feature Selection as Intrusion Detection Systems (IDS)
verfasst von
H. S. Hota
Akhilesh Kumar Shrivas
Copyright-Jahr
2014
Verlag
Springer India
DOI
https://doi.org/10.1007/978-81-322-1665-0_85

Premium Partner