Skip to main content

2020 | OriginalPaper | Buchkapitel

63. RAkEL Algorithm and Mahalanobis Distance-Based Intrusion Detection System Against Network Intrusions

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

With a quick increment in the volume of information in everyday life, there is dependably a requirement for an intrusion detection framework which distinguishes and identifies the attacks at a quicker pace. Any action which abuses the approach of the security premises is characterized as an intrusion. Intrusion detection system (IDS) is an hardware that cocurrences with intrusions produced by an alternate host network frameworks and system sources, then looking at the sign of security issues. IDS is also used to recognize unapproved usage of PC, which ought to interface the gaps in against antivirus and firewall. A general issue in the current IDS is the high false-positives and low-detection rate. This chapter talks about the essential intrusion detection procedures by means of live capturing of network packets. The proposed system uses Mahalanobis distance methodology in best attribute selection and exhaustive search feature selection methods for feature ranking and removal of features for choosing the superlative possible combinations of features from the feature set obtained from the network packets. The RAndom k-labELsets (RAkEL) multi-label ensemble learning algorithm in combination with machine learning algorithms, like J48, support vector machine (SVM) and Naïve Bayes (NB), are utilized to build up the proposed IDS by classifying different network intrusions with higher detection rate and lower false-positive rate.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Anderson JP (1980) Computer security threat monitoring and surveillance. In: Technical report. Fort Washington, Pennsylvania: James P Anderson Co Anderson JP (1980) Computer security threat monitoring and surveillance. In: Technical report. Fort Washington, Pennsylvania: James P Anderson Co
2.
Zurück zum Zitat Lee W, Stolfo S, Mok K (2000) A data mining framework for constructing features and models for intrusion detection systems. Technical report, Graduate School of Arts and Science, Columbia University Lee W, Stolfo S, Mok K (2000) A data mining framework for constructing features and models for intrusion detection systems. Technical report, Graduate School of Arts and Science, Columbia University
3.
Zurück zum Zitat Devale PR, Garje GV, Mulay SA (2010) Intrusion detection system using support vector machine and decision tree. Int J Comput 3:0975–8887 Devale PR, Garje GV, Mulay SA (2010) Intrusion detection system using support vector machine and decision tree. Int J Comput 3:0975–8887
4.
Zurück zum Zitat Geetha Ramani R, Siva Sathya S, Sivaselvi K (2011) Discriminant analysis based feature selection in KDD intrusion dataset. Int J Comput Appl 31(11):0975–8887 Geetha Ramani R, Siva Sathya S, Sivaselvi K (2011) Discriminant analysis based feature selection in KDD intrusion dataset. Int J Comput Appl 31(11):0975–8887
5.
Zurück zum Zitat Balakrishnan S, Venkatalakshmi K, Kannan A (2014) Intrusion detection system using feature selection and classification technique. Int J Comput Sci Appl 3(4):145–151 Balakrishnan S, Venkatalakshmi K, Kannan A (2014) Intrusion detection system using feature selection and classification technique. Int J Comput Sci Appl 3(4):145–151
6.
Zurück zum Zitat Manekar V, Waghmare K (2014) Intrusion detection system using Support Vector Machine (SVM) and Particle Swarm Optimization (PSO). Int J Adv Comput Res 4(3):808 Manekar V, Waghmare K (2014) Intrusion detection system using Support Vector Machine (SVM) and Particle Swarm Optimization (PSO). Int J Adv Comput Res 4(3):808
7.
Zurück zum Zitat Bhavsar Yogita B, Waghmare Kalyani C (2013) Intrusion detection system using data mining technique: support vector machine. Int J Emerg Technol Adv Eng 3(3). ISSN:2250-2459 Bhavsar Yogita B, Waghmare Kalyani C (2013) Intrusion detection system using data mining technique: support vector machine. Int J Emerg Technol Adv Eng 3(3). ISSN:2250-2459
Metadaten
Titel
RAkEL Algorithm and Mahalanobis Distance-Based Intrusion Detection System Against Network Intrusions
verfasst von
R. Padmashani
M. Nivaashini
R. Vidhyapriya
Copyright-Jahr
2020
DOI
https://doi.org/10.1007/978-3-030-24051-6_63