Skip to main content

2015 | OriginalPaper | Buchkapitel

A New Metric for Proficient Performance Evaluation of Intrusion Detection System

verfasst von : Preeti Aggarwal, Sudhir Kumar Sharma

Erschienen in: International Joint Conference

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Intrusion Detection System (IDS) can be called efficient when maximum intrusion attacks are detected with minimum false alarm rate but due to imbalanced data, these two metrics are not comparable on the same scale. In this paper, a new NPR metric is suggested in view of the imbalanced data set to rank the classification algorithms for IDS which can help analyze and identify the best possible combination of high detection rate and low false alarm rate with maximum accuracy and F-score. The new NPR metric is used for comparison and ordering of ten classifiers simulated on KDD data set.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Tsai, C.-F. et al.: Intrusion detection by machine learning: a review. Exp. Syst. Appl. 36(10), 11994–12000 (2009) Tsai, C.-F. et al.: Intrusion detection by machine learning: a review. Exp. Syst. Appl. 36(10), 11994–12000 (2009)
2.
Zurück zum Zitat Gupta, S., Kumar, P., Abraham, A.: A profile based network intrusion detection and prevention system for securing cloud environment. Int. J. Distrib. Sens. Netw. (2013) Gupta, S., Kumar, P., Abraham, A.: A profile based network intrusion detection and prevention system for securing cloud environment. Int. J. Distrib. Sens. Netw. (2013)
6.
Zurück zum Zitat Tavallaee, M., Bagheri, E., Lu, W., Ghorbani, A.A.: A detailed analysis of the KDD CUP 99 data set. In: The Proceedings of IEEE Symposium on Computational Intelligence in Security and Defense Applications, pp. 1–6 (2009) Tavallaee, M., Bagheri, E., Lu, W., Ghorbani, A.A.: A detailed analysis of the KDD CUP 99 data set. In: The Proceedings of IEEE Symposium on Computational Intelligence in Security and Defense Applications, pp. 1–6 (2009)
7.
Zurück zum Zitat McHugh, J.: Testing intrusion detection systems: a critique of the 1998 and 1999 Darpa intrusion detection system evaluations as performed by Lincoln laboratory. ACM Trans. Inf. Syst. Secur. 3(4), 262–294 (2000)CrossRef McHugh, J.: Testing intrusion detection systems: a critique of the 1998 and 1999 Darpa intrusion detection system evaluations as performed by Lincoln laboratory. ACM Trans. Inf. Syst. Secur. 3(4), 262–294 (2000)CrossRef
8.
Zurück zum Zitat Qiang, Y., Wu, X.: 10 challenging problems in data mining research. Int. J. Inf. Technol. Decis. Making 5(04), 597–604 (2006)CrossRef Qiang, Y., Wu, X.: 10 challenging problems in data mining research. Int. J. Inf. Technol. Decis. Making 5(04), 597–604 (2006)CrossRef
9.
Zurück zum Zitat Chawla N.V.: Data mining for imbalanced datasets: an overview. Data Mining and Knowledge Discovery Handbook, pp. 875–886. Springer US (2010) Chawla N.V.: Data mining for imbalanced datasets: an overview. Data Mining and Knowledge Discovery Handbook, pp. 875–886. Springer US (2010)
10.
Zurück zum Zitat Kotsiantis, S., Kanellopoulos, D., Pintelas, P.: Handling imbalanced datasets: a review. GESTS Int. Trans. Comput. Sci. Eng. 30(1), 25–36 (2006) Kotsiantis, S., Kanellopoulos, D., Pintelas, P.: Handling imbalanced datasets: a review. GESTS Int. Trans. Comput. Sci. Eng. 30(1), 25–36 (2006)
11.
Zurück zum Zitat Hulse, V., Jason, Khoshgoftaar, T.M., Napolitano, A.: Experimental perspectives on learning from imbalanced data. In: Proceedings of the 24th International Conference on Machine learning. ACM, New York (2007) Hulse, V., Jason, Khoshgoftaar, T.M., Napolitano, A.: Experimental perspectives on learning from imbalanced data. In: Proceedings of the 24th International Conference on Machine learning. ACM, New York (2007)
12.
Zurück zum Zitat Fernandez-Delgado, M., Cernadas, E.: Do we need hundreds of classifiers to solve real world classification problems? J. Mach. Learn. Res. 15, 3133–3181 (2014)MATHMathSciNet Fernandez-Delgado, M., Cernadas, E.: Do we need hundreds of classifiers to solve real world classification problems? J. Mach. Learn. Res. 15, 3133–3181 (2014)MATHMathSciNet
13.
Zurück zum Zitat González, S., et al.: Testing ensembles for intrusion detection: on the identification of mutated network scans. Computational intelligence in security for information systems, pp. 109–117. Springer, Berlin (2011) González, S., et al.: Testing ensembles for intrusion detection: on the identification of mutated network scans. Computational intelligence in security for information systems, pp. 109–117. Springer, Berlin (2011)
14.
Zurück zum Zitat Alhomouda, A., Munira, R., Dissoa, J.P., Awana, I., Al-Dhelaanb, A.: Performance evaluation study of intrusion detection systems. Proc. Comput. Sci. 5, 173–180 (2011) Alhomouda, A., Munira, R., Dissoa, J.P., Awana, I., Al-Dhelaanb, A.: Performance evaluation study of intrusion detection systems. Proc. Comput. Sci. 5, 173–180 (2011)
15.
Zurück zum Zitat Sokolova, M., Lapalme, G.: A systematic analysis of performance measures for classification tasks. Inf. Process. Manag. 45(4), 427–437 (2009) Sokolova, M., Lapalme, G.: A systematic analysis of performance measures for classification tasks. Inf. Process. Manag. 45(4), 427–437 (2009)
16.
Zurück zum Zitat Ferri, C., Hernández-Orallo, J., Modroiu, R.: An experimental comparison of performance measures for classification. Pattern Recogn. Lett. 30(1), 27–38 (2009)CrossRef Ferri, C., Hernández-Orallo, J., Modroiu, R.: An experimental comparison of performance measures for classification. Pattern Recogn. Lett. 30(1), 27–38 (2009)CrossRef
17.
Zurück zum Zitat Cardenas, A.A., Baras, J.S., Seamon, K.: A framework for the evaluation of intrusion detection systems. IEEE Symp. Secur. Priv. 15–77 (2006) Cardenas, A.A., Baras, J.S., Seamon, K.: A framework for the evaluation of intrusion detection systems. IEEE Symp. Secur. Priv. 15–77 (2006)
18.
Zurück zum Zitat Nagarajan, A., Quyen N., Banks, R., Sood, A.: Combining intrusion detection and recovery for enhancing system dependability. In: IFIP 41st International Conference on Dependable Systems and Networks Workshops (DSN-W) (2011) Nagarajan, A., Quyen N., Banks, R., Sood, A.: Combining intrusion detection and recovery for enhancing system dependability. In: IFIP 41st International Conference on Dependable Systems and Networks Workshops (DSN-W) (2011)
19.
Zurück zum Zitat Pietraszek, T., Tanner, A.: Information security technical report. 10(3), 169–183 (2005) (Elsevier) Pietraszek, T., Tanner, A.: Information security technical report. 10(3), 169–183 (2005) (Elsevier)
20.
Zurück zum Zitat Giacinto, G., Perdisci, R., Del Rio, M., Roli, F.: Intrusion detection in computer networks by a modular ensemble of one-class classifiers. Special Issue on Applications of Ensemble Methods, Information Fusion, Vol. 9, no 1, pp. 69–82 (2008) Giacinto, G., Perdisci, R., Del Rio, M., Roli, F.: Intrusion detection in computer networks by a modular ensemble of one-class classifiers. Special Issue on Applications of Ensemble Methods, Information Fusion, Vol. 9, no 1, pp. 69–82 (2008)
21.
Zurück zum Zitat Chandola, V., Banerjee, A. and Kumar, V.: Anomaly detection: a survey. ACM Comput. Surv. (CSUR) 41(3), 15 (2009) Chandola, V., Banerjee, A. and Kumar, V.: Anomaly detection: a survey. ACM Comput. Surv. (CSUR) 41(3), 15 (2009)
22.
Zurück zum Zitat Han, J., Kamber, M.: Data mining: concepts and techniques, 3rd edn. Morgan Kaufmann, San Francisco (2012) Han, J., Kamber, M.: Data mining: concepts and techniques, 3rd edn. Morgan Kaufmann, San Francisco (2012)
23.
Zurück zum Zitat Witten, I.H., Frank, E., Hall, M.A.: Data mining- practical machine learning tools and techniques. Morgan Kaufmann, San Francisco (2011) Witten, I.H., Frank, E., Hall, M.A.: Data mining- practical machine learning tools and techniques. Morgan Kaufmann, San Francisco (2011)
Metadaten
Titel
A New Metric for Proficient Performance Evaluation of Intrusion Detection System
verfasst von
Preeti Aggarwal
Sudhir Kumar Sharma
Copyright-Jahr
2015
DOI
https://doi.org/10.1007/978-3-319-19713-5_28

Premium Partner