Skip to main content
Erschienen in: Wireless Personal Communications 4/2022

29.04.2022

Poly Logarithmic Naive Bayes Intrusion Detection System Using Linear Stable PCA Feature Extraction

verfasst von: Sukhvinder Singh

Erschienen in: Wireless Personal Communications | Ausgabe 4/2022

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Software defined network is smart and centralized architecture which increases the network performance and it is efficiently programmed to support different framework of big data and cloud computing virtualization. Several network categorical traffic attacks attributes are many issues which numerous of conventional IDS-Intrusion Detection System with lesser efficiency in terms of recognition, augmented rate of false positive, and bad generalization capacity. Thus, it is necessary to propose a method redresses all of the mentioned issues. In this paper, we propose the IDS methodology to recognize the maliciousness in the Software defined network (SDN) with the novel linearly stable PCA to extract the features. Afterwards, the extracted features will be classified with the novel poly logarithmic function based Naive Bayes classification methodology to diagnose between the normal and abnormal nodes. Finally, we carry out the performance evaluation in terms of accuracy, recall, FPR, TPR, and many performance by using the datasets of \(KDD TEST^{ - 21}\) and KDD TEST plus for validating the proposed IDS performance.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Tao, P., Sun, Z., & Sun, Z. (2018). An improved intrusion detection algorithm based on GA and SVM. Ieee Access, 6, 13624–13631.CrossRef Tao, P., Sun, Z., & Sun, Z. (2018). An improved intrusion detection algorithm based on GA and SVM. Ieee Access, 6, 13624–13631.CrossRef
2.
Zurück zum Zitat Liu, H., & Lang, B. (2019). Machine learning and deep learning methods for intrusion detection systems: A survey. Applied Sciences, 9, 4396.CrossRef Liu, H., & Lang, B. (2019). Machine learning and deep learning methods for intrusion detection systems: A survey. Applied Sciences, 9, 4396.CrossRef
3.
Zurück zum Zitat Alrowaily, M., Alenezi, F., & Lu, Z. (2019). Effectiveness of machine learning based intrusion detection systems. In International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage (pp. 277–288). Springer, Cham. Alrowaily, M., Alenezi, F., & Lu, Z. (2019). Effectiveness of machine learning based intrusion detection systems. In International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage (pp. 277–288). Springer, Cham.
4.
Zurück zum Zitat Handa, A., Sharma, A., & Shukla, S. K. (2019). Machine learning in cybersecurity: A review. Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery, 9, e1306. Handa, A., Sharma, A., & Shukla, S. K. (2019). Machine learning in cybersecurity: A review. Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery, 9, e1306.
5.
Zurück zum Zitat Mishra, P., Varadharajan, V., Tupakula, U., & Pilli, E. S. (2018). A detailed investigation and analysis of using machine learning techniques for intrusion detection. IEEE Communications Surveys & Tutorials, 21, 686–728.CrossRef Mishra, P., Varadharajan, V., Tupakula, U., & Pilli, E. S. (2018). A detailed investigation and analysis of using machine learning techniques for intrusion detection. IEEE Communications Surveys & Tutorials, 21, 686–728.CrossRef
6.
Zurück zum Zitat Ahmad, I., Basheri, M., Iqbal, M. J., & Rahim, A. (2018). Performance comparison of support vector machine, random forest, and extreme learning machine for intrusion detection. IEEE Access, 6, 33789–33795.CrossRef Ahmad, I., Basheri, M., Iqbal, M. J., & Rahim, A. (2018). Performance comparison of support vector machine, random forest, and extreme learning machine for intrusion detection. IEEE Access, 6, 33789–33795.CrossRef
7.
Zurück zum Zitat Alhakami, W., ALharbi, A., Bourouis, S., Alroobaea, R., & Bouguila, N. (2019). Network anomaly intrusion detection using a nonparametric Bayesian approach and feature selection. IEEE Access, 7, 52181–52190. Alhakami, W., ALharbi, A., Bourouis, S., Alroobaea, R., & Bouguila, N. (2019). Network anomaly intrusion detection using a nonparametric Bayesian approach and feature selection. IEEE Access7, 52181–52190.
8.
Zurück zum Zitat Ghafir, I., Kyriakopoulos, K. G., Aparicio-Navarro, F. J., Lambotharan, S., Assadhan, B., & Binsalleeh, H. (2018). A basic probability assignment methodology for unsupervised wireless intrusion detection. IEEE Access, 6, 40008–40023.CrossRef Ghafir, I., Kyriakopoulos, K. G., Aparicio-Navarro, F. J., Lambotharan, S., Assadhan, B., & Binsalleeh, H. (2018). A basic probability assignment methodology for unsupervised wireless intrusion detection. IEEE Access, 6, 40008–40023.CrossRef
9.
Zurück zum Zitat Lv, S., Wang, J., Yang, Y., & Liu, J. (2018). Intrusion prediction with system-call sequence-to-sequence model. IEEE Access, 6, 71413–71421.CrossRef Lv, S., Wang, J., Yang, Y., & Liu, J. (2018). Intrusion prediction with system-call sequence-to-sequence model. IEEE Access, 6, 71413–71421.CrossRef
10.
Zurück zum Zitat Jan, S. U., Ahmed, S., Shakhov, V., & Koo, I. (2019). Toward a lightweight intrusion detection system for the internet of things. IEEE Access, 7, 42450–42471.CrossRef Jan, S. U., Ahmed, S., Shakhov, V., & Koo, I. (2019). Toward a lightweight intrusion detection system for the internet of things. IEEE Access, 7, 42450–42471.CrossRef
11.
Zurück zum Zitat Camacho, J., Therón, R., García-Giménez, J. M., Maciá-Fernández, G., & García-Teodoro, P. (2019). Group-wise principal component analysis for exploratory intrusion detection. IEEE Access, 7, 113081–113093.CrossRef Camacho, J., Therón, R., García-Giménez, J. M., Maciá-Fernández, G., & García-Teodoro, P. (2019). Group-wise principal component analysis for exploratory intrusion detection. IEEE Access, 7, 113081–113093.CrossRef
12.
Zurück zum Zitat Tama, B. A., Comuzzi, M., & Rhee, K.-H. (2019). TSE-IDS: A two-stage classifier ensemble for intelligent anomaly-based intrusion detection system. IEEE Access, 7, 94497–94507.CrossRef Tama, B. A., Comuzzi, M., & Rhee, K.-H. (2019). TSE-IDS: A two-stage classifier ensemble for intelligent anomaly-based intrusion detection system. IEEE Access, 7, 94497–94507.CrossRef
13.
Zurück zum Zitat Prabavathy, S., Sundarakantham, K., & Shalinie, S. M. (2018). Design of cognitive fog computing for intrusion detection in Internet of Things. Journal of Communications and Networks, 20, 291–298.CrossRef Prabavathy, S., Sundarakantham, K., & Shalinie, S. M. (2018). Design of cognitive fog computing for intrusion detection in Internet of Things. Journal of Communications and Networks, 20, 291–298.CrossRef
14.
Zurück zum Zitat Narasimha Mallikarjunan, K., Bhuvaneshwaran, A., Sundarakantham, K., & Mercy Shalinie, S. (2019). DDAM: detecting DDoS attacks using machine learning approach. In Computational Intelligence: Theories, Applications and Future Directions-Volume I (pp. 261–273). Springer, Singapore. Narasimha Mallikarjunan, K., Bhuvaneshwaran, A., Sundarakantham, K., & Mercy Shalinie, S. (2019). DDAM: detecting DDoS attacks using machine learning approach. In Computational Intelligence: Theories, Applications and Future Directions-Volume I (pp. 261–273). Springer, Singapore.
15.
Zurück zum Zitat Jabbar, M., & Aluvalu, R. (2017). RFAODE: A novel ensemble intrusion detection system. Procedia computer science, 115, 226–234.CrossRef Jabbar, M., & Aluvalu, R. (2017). RFAODE: A novel ensemble intrusion detection system. Procedia computer science, 115, 226–234.CrossRef
16.
Zurück zum Zitat Ikram, S. T., & Cherukuri, A. K. (2016). Improving accuracy of intrusion detection model using PCA and optimized SVM. Journal of computing and information technology, 24, 133–148.CrossRef Ikram, S. T., & Cherukuri, A. K. (2016). Improving accuracy of intrusion detection model using PCA and optimized SVM. Journal of computing and information technology, 24, 133–148.CrossRef
17.
Zurück zum Zitat Fouladi, R. F., Kayatas, C. E., & Anarim, E. (2016, June). Frequency based DDoS attack detection approach using naive Bayes classification. In 2016 39th International Conference on Telecommunications and Signal Processing (TSP) (pp. 104–107). IEEE. Fouladi, R. F., Kayatas, C. E., & Anarim, E. (2016, June). Frequency based DDoS attack detection approach using naive Bayes classification. In 2016 39th International Conference on Telecommunications and Signal Processing (TSP) (pp. 104–107). IEEE.
18.
Zurück zum Zitat Serpen, G., & Aghaei, E. (2018). Host-based misuse intrusion detection using PCA feature extraction and kNN classification algorithms. Intelligent Data Analysis, 22, 1101–1114.CrossRef Serpen, G., & Aghaei, E. (2018). Host-based misuse intrusion detection using PCA feature extraction and kNN classification algorithms. Intelligent Data Analysis, 22, 1101–1114.CrossRef
19.
Zurück zum Zitat Vimalkumar, K., & Radhika, N. (2017, September). A big data framework for intrusion detection in smart grids using apache spark. In 2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI) (pp. 198–204). IEEE. Vimalkumar, K., & Radhika, N. (2017, September). A big data framework for intrusion detection in smart grids using apache spark. In 2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI) (pp. 198–204). IEEE.
20.
Zurück zum Zitat Kevric, J., Jukic, S., & Subasi, A. (2017). An effective combining classifier approach using tree algorithms for network intrusion detection. Neural Computing and Applications, 28, 1051–1058.CrossRef Kevric, J., Jukic, S., & Subasi, A. (2017). An effective combining classifier approach using tree algorithms for network intrusion detection. Neural Computing and Applications, 28, 1051–1058.CrossRef
21.
Zurück zum Zitat Dhanabal, L., & Shantharajah, S. (2015). A study on NSL-KDD dataset for intrusion detection system based on classification algorithms. International Journal of Advanced Research in Computer and Communication Engineering, 4, 446–452. Dhanabal, L., & Shantharajah, S. (2015). A study on NSL-KDD dataset for intrusion detection system based on classification algorithms. International Journal of Advanced Research in Computer and Communication Engineering, 4, 446–452.
22.
Zurück zum Zitat Papamartzivanos, D., Mármol, F. G., & Kambourakis, G. (2019). Introducing deep learning self-adaptive misuse network intrusion detection systems. IEEE Access, 7, 13546–13560.CrossRef Papamartzivanos, D., Mármol, F. G., & Kambourakis, G. (2019). Introducing deep learning self-adaptive misuse network intrusion detection systems. IEEE Access, 7, 13546–13560.CrossRef
23.
Zurück zum Zitat Al-Qatf, M., Lasheng, Y., Al-Habib, M., & Al-Sabahi, K. (2018). Deep learning approach combining sparse autoencoder with SVM for network intrusion detection. IEEE Access, 6, 52843–52856.CrossRef Al-Qatf, M., Lasheng, Y., Al-Habib, M., & Al-Sabahi, K. (2018). Deep learning approach combining sparse autoencoder with SVM for network intrusion detection. IEEE Access, 6, 52843–52856.CrossRef
24.
Zurück zum Zitat Yang, H., & Wang, F. (2019). Wireless network intrusion detection based on improved convolutional neural network. IEEE Access, 7, 64366–64374.CrossRef Yang, H., & Wang, F. (2019). Wireless network intrusion detection based on improved convolutional neural network. IEEE Access, 7, 64366–64374.CrossRef
Metadaten
Titel
Poly Logarithmic Naive Bayes Intrusion Detection System Using Linear Stable PCA Feature Extraction
verfasst von
Sukhvinder Singh
Publikationsdatum
29.04.2022
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 4/2022
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-022-09701-2

Weitere Artikel der Ausgabe 4/2022

Wireless Personal Communications 4/2022 Zur Ausgabe

Neuer Inhalt