Skip to main content
Top
Published in:
Cover of the book

2021 | OriginalPaper | Chapter

Intrusion Detection Using a Hybrid Sequential Model

Authors : Abhishek Sinha, Aditya Pandey, P. S. Aishwarya

Published in: Advances in Machine Learning and Computational Intelligence

Publisher: Springer Singapore

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

A large amount of work has been done on the KDD 99 dataset, most of which include the use of a hybrid anomaly and misuse detection model done in parallel with each other. In order to further classify the intrusions, our approach to network intrusion detection includes the use of two different anomaly detection models followed by misuse detection applied to the combined output obtained from the previous step. The end goal of this is to verify the anomalies detected by the anomaly detection algorithm and clarify whether they are actually intrusions or random outliers from the trained normal (and thus to try and reduce the number of false positives). We aim to detect a pattern in this novel intrusion technique itself, and not the handling of such intrusions. The intrusions were detected to a very high degree of accuracy.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference A. Lazarevic, L. Ertoz, V. Kumar, A comparative study of anomaly detection schemes in network intrusion detection. in Proceedings of the 2003 SIAM International Conference on Data Mining (2002) A. Lazarevic, L. Ertoz, V. Kumar, A comparative study of anomaly detection schemes in network intrusion detection. in Proceedings of the 2003 SIAM International Conference on Data Mining (2002)
2.
go back to reference D. Barbara, N. Wu, S. Jajodia, Detecting novel network intrusions using bayes estimators. in Proceedings of the 2001 SIAM International Conference on Data Mining (2001) D. Barbara, N. Wu, S. Jajodia, Detecting novel network intrusions using bayes estimators. in Proceedings of the 2001 SIAM International Conference on Data Mining (2001)
3.
go back to reference S.A. Hofmeyr, S. Forrest, A. Somayaji, Intrusion detection using sequences of system calls. J. Comput. Security. 6(3), 151–180 (1998) S.A. Hofmeyr, S. Forrest, A. Somayaji, Intrusion detection using sequences of system calls. J. Comput. Security. 6(3), 151–180 (1998)
4.
go back to reference A. Ghosh, A. Schwartzbard, A study in using neural networks for anomaly and misuse detection. in Proceedings of the 8th USENIX Security Symposium, August 23–36,(1999), pp. 141–152 A. Ghosh, A. Schwartzbard, A study in using neural networks for anomaly and misuse detection. in Proceedings of the 8th USENIX Security Symposium, August 23–36,(1999), pp. 141–152
5.
go back to reference E. Eskin, W. Lee, S.J. Stolfo, Modeling system calls for intrusion detection with dynamic window sizes. in Proceedings DARPA Information Survivability Conference and Exposition II, (DISCEX’01, 2001) E. Eskin, W. Lee, S.J. Stolfo, Modeling system calls for intrusion detection with dynamic window sizes. in Proceedings DARPA Information Survivability Conference and Exposition II, (DISCEX’01, 2001)
6.
go back to reference R. Sekar, A. Gupta, J. Frullo. Specification-based anomaly detection: A new approach for detecting network intrusions. in CCS ‘02: Proceedings of the 9th ACM conference on Computer and communications security, November 2002, (2002), pp. 265–274 R. Sekar, A. Gupta, J. Frullo. Specification-based anomaly detection: A new approach for detecting network intrusions. in CCS ‘02: Proceedings of the 9th ACM conference on Computer and communications security, November 2002, (2002), pp. 265–274
7.
go back to reference J. Zhang, M. Zulkernine, A. Haque, Random-forests-based network intrusion detection systems. in IEEE Transactions on Systems, Man, and Cybernetics—part C: Applications and Reviews, vol. 38, No. 5 (2008) J. Zhang, M. Zulkernine, A. Haque, Random-forests-based network intrusion detection systems. in IEEE Transactions on Systems, Man, and Cybernetics—part C: Applications and Reviews, vol. 38, No. 5 (2008)
8.
go back to reference J. Cannady, Artificial neural networks for misuse detection. in National Information Systems Security Conference, (1998) J. Cannady, Artificial neural networks for misuse detection. in National Information Systems Security Conference, (1998)
9.
go back to reference R.S. Landge, A.P. Wadh, Misuse detection system using various techniques: A review. Int. J. Adv. Res. Comput. Sci., Udaipur 4(6) (2013) R.S. Landge, A.P. Wadh, Misuse detection system using various techniques: A review. Int. J. Adv. Res. Comput. Sci., Udaipur 4(6) (2013)
Metadata
Title
Intrusion Detection Using a Hybrid Sequential Model
Authors
Abhishek Sinha
Aditya Pandey
P. S. Aishwarya
Copyright Year
2021
Publisher
Springer Singapore
DOI
https://doi.org/10.1007/978-981-15-5243-4_1

Premium Partners