An intelligent intrusion detection system (IDS) for anomaly and misuse detection in computer networks

被引:273
|
作者
Depren, O [1 ]
Topallar, M [1 ]
Anarim, E [1 ]
Ciliz, MK [1 ]
机构
[1] Bogazici Univ, Dept Elect Engn & Elect, Informat & Commun Secur Lab, Istanbul, Turkey
关键词
intrusion detection; anomaly detection; misuse detection; SOM; decision trees; J.48; KDD Cup 99; hybrid intrusion detection;
D O I
10.1016/j.eswa.2005.05.002
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In this paper, we propose a novel Intrusion Detection System (IDS) architecture utilizing both anomaly and misuse detection approaches. This hybrid Intrusion Detection System architecture consists of an anomaly detection module, a misuse detection module and a decision support system combining the results of these two detection modules. The proposed anomaly detection module uses a Self-Organizing Map (SOM) structure to model normal behavior. Deviation from the normal behavior is classified as an attack. The proposed misuse detection module uses J.48 decision tree algorithm to classify various types of attacks. The principle interest of this work is to benchmark the performance of the proposed hybrid IDS architecture by using KDD Cup 99 Data Set, the benchmark dataset used by IDS researchers. A rule-based Decision Support System (DSS) is also developed for interpreting the results of both anomaly and misuse detection modules. Simulation results of both anomaly and misuse detection modules based on the KDD 99 Data Set are given. It is observed that the proposed hybrid approach gives better performance over individual approaches. (c) 2005 Elsevier Ltd. All rights reserved.
引用
收藏
页码:713 / 722
页数:10
相关论文
共 50 条
  • [21] Spam Intrusion Detection in Computer Networks Using Intelligent Techniques
    Ribeiro, Patricia Bellin
    da Silva, Luis Alexandre
    Pontara da Costa, Kelton Augusto
    PROCEEDINGS OF THE 2015 IFIP/IEEE INTERNATIONAL SYMPOSIUM ON INTEGRATED NETWORK MANAGEMENT (IM), 2015, : 1357 - 1360
  • [22] TSE-IDS: A Two-Stage Classifier Ensemble for Intelligent Anomaly-Based Intrusion Detection System
    Tama, Bayu Adhi
    Comuzzi, Marco
    Rhee, Kyung-Hyune
    IEEE ACCESS, 2019, 7 : 94497 - 94507
  • [23] Anomaly detection enhanced classification in computer intrusion detection
    Fugate, M
    Gattiker, JR
    PATTERN RECOGNITION WITH SUPPORT VECTOR MACHINES, PROCEEDINGS, 2002, 2388 : 186 - 197
  • [25] A Survey on Intrusion Detection System (IDS) and Internal Intrusion Detection and Protection System (IIDPS)
    Borkar, Amol
    Donode, Akshay
    Kumari, Anjali
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INVENTIVE COMPUTING AND INFORMATICS (ICICI 2017), 2017, : 949 - 953
  • [26] Anomaly-based Intrusion Detection in Computer Networks using Wavelets
    Perlin, Tiago
    Nunes, Raul Ceretta
    Kozakevicius, Alice de Jesus
    REVISTA BRASILEIRA DE COMPUTACAO APLICADA, 2011, 3 (01): : 2 - 15
  • [27] SCADA Networks Anomaly-based Intrusion Detection System
    Almehmadi, Abdulaziz
    11TH INTERNATIONAL CONFERENCE ON SECURITY OF INFORMATION AND NETWORKS (SIN 2018), 2018,
  • [28] Computer intrusion detection with classification and anomaly detection, using SVMs
    Fugate, M
    Gattiker, JR
    INTERNATIONAL JOURNAL OF PATTERN RECOGNITION AND ARTIFICIAL INTELLIGENCE, 2003, 17 (03) : 441 - 458
  • [29] An intelligent intrusion detection system
    Nevrus Kaja
    Adnan Shaout
    Di Ma
    Applied Intelligence, 2019, 49 : 3235 - 3247
  • [30] Intelligent intrusion detection system
    Lee, KC
    Mikhailov, L
    2004 2ND INTERNATIONAL IEEE CONFERENCE INTELLIGENT SYSTEMS, VOLS 1 AND 2, PROCEEDINGS, 2004, : 497 - 502