Skip to main content
Top

2014 | OriginalPaper | Chapter

Data Mining Approach for Developing Various Models Based on Types of Attack and Feature Selection as Intrusion Detection Systems (IDS)

Authors : H. S. Hota, Akhilesh Kumar Shrivas

Published in: Intelligent Computing, Networking, and Informatics

Publisher: Springer India

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Information security is one of the important issues to protect data or information from unauthorized access. Classification techniques play very important role in information security to classify data as legitimate or normal data. Nowadays, network traffic includes large amount of irrelevant information that increases complexity of classifier and affect the classification result, so we need to develop robust model that can classify the data with high accuracy. In this paper, various types of classification techniques are applied on NSL-KDD data with Tenfold cross-validation technique in two different viewpoints. First, the classification techniques are applied for two class problem as binary classification (normal and attack), and second, it is applied for five class problem as multiclass classification. Empirical result shows that random forest technique outperforms in case of two class problem as well as five class problem on NSL-KDD data set. Due to large amount of redundant data, we have also applied feature selection techniques on random forest tree model which is best model as binary classifier as well as multiclass classifier. Model produces highest accuracy with 15 features in case of binary classification. Performance of the various models are also evaluated using other performance measures like true-positive rate (TPR), false-positive rate (FPR), precision, F-measure and receiver operating characteristic (ROC) curve and the results are found to be satisfactory.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Koc, L., et al.: A network intrusion detection system based on hidden naive bayes multiclass classifier. J. Expert Syst. Appl. 39, 13492–13500 (2012)CrossRef Koc, L., et al.: A network intrusion detection system based on hidden naive bayes multiclass classifier. J. Expert Syst. Appl. 39, 13492–13500 (2012)CrossRef
2.
go back to reference Sun, M., et al.: A new method of feature selection for flow classification. International Conference on Applied Physics and Industrial Engineering, vol. 24, pp. 1729–1736 (2012) Sun, M., et al.: A new method of feature selection for flow classification. International Conference on Applied Physics and Industrial Engineering, vol. 24, pp. 1729–1736 (2012)
3.
go back to reference Mukherjee, S., et al.: Intrusion detection using bayes classifier with feature reduction. Procedia Technol. 4, 119–128 (2012)CrossRef Mukherjee, S., et al.: Intrusion detection using bayes classifier with feature reduction. Procedia Technol. 4, 119–128 (2012)CrossRef
5.
go back to reference Pujari, A.K.: Data mining techniques, 4th edn. Universities Press (India) Private Limited (2001) Pujari, A.K.: Data mining techniques, 4th edn. Universities Press (India) Private Limited (2001)
6.
go back to reference Cios, K., et al.: Data mining methods for knowledge discovery, 3rd edn. Kluwer Academic Publishers, Heidelberg (2000)MATH Cios, K., et al.: Data mining methods for knowledge discovery, 3rd edn. Kluwer Academic Publishers, Heidelberg (2000)MATH
7.
go back to reference Han, J., Kamber, M.: Data mining concepts and techniques, 2nd edn. Morgan Kaufmann, San Francisco (2006)MATH Han, J., Kamber, M.: Data mining concepts and techniques, 2nd edn. Morgan Kaufmann, San Francisco (2006)MATH
8.
go back to reference Wang, J.: Data Mining: opportunities and challenges. Idea Group, USA (2003)CrossRef Wang, J.: Data Mining: opportunities and challenges. Idea Group, USA (2003)CrossRef
Metadata
Title
Data Mining Approach for Developing Various Models Based on Types of Attack and Feature Selection as Intrusion Detection Systems (IDS)
Authors
H. S. Hota
Akhilesh Kumar Shrivas
Copyright Year
2014
Publisher
Springer India
DOI
https://doi.org/10.1007/978-81-322-1665-0_85

Premium Partner