A Visualization Strategy with a Pentacle and its Application in the Intrusion Detection System

Article Preview

Abstract:

In this paper, a novel pentacle-based visualization strategy is used to generate numerical feature for network visiting data. A 20-dimensional feature set is built for the 5-class classifier so as to establish an accurate intrusion detection system. By integrating the proposed 20 new features with the built-in feature sets, which consists of 41 features, the new intrusion detection system achieves an accuracy of 99.588%.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

647-652

Citation:

Online since:

August 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] Li, Yang, and Li Guo. An active learning based TCM-KNN algorithm for supervised network intrusion detection. Computers & security 26. 7 (2007): 459-467.

DOI: 10.1016/j.cose.2007.10.002

Google Scholar

[2] Mukherjee B, Heberlein L T, Levitt K N. Network intrusion detection. Network, IEEE, (1994).

Google Scholar

[3] Mukkamala S, Janoski G, Sung A. Intrusion detection using neural networks and support vector machines. Neural Networks, 2002. IJCNN'02. Proceedings of the 2002 International Joint Conference on. IEEE, 2002, 2: 1702-1707.

DOI: 10.1109/ijcnn.2002.1007774

Google Scholar

[4] Botha M, von Solms R. Utilising fuzzy logic and trend analysis for effective intrusion detection. Computers & Security, 2003, 22(5): 423-434.

DOI: 10.1016/s0167-4048(03)00511-x

Google Scholar

[5] Debar H, Becker M, Siboni D. A neural network component for an intrusion detection system. Research in Security and Privacy, 1992. Proceedings, 1992 IEEE Computer Society Symposium on. IEEE, 1992: 240-250.

DOI: 10.1109/risp.1992.213257

Google Scholar

[6] Liao Y, Vemuri V R. Use of K-nearest neighbor classifier for intrusion detection. Computers & Security, 2002, 21(5): 439-448.

DOI: 10.1016/s0167-4048(02)00514-x

Google Scholar

[7] Jamdagni A, Tan Z, He X, et al. RePIDS: A multi tier Real-time Payload-based Intrusion Detection System. Computer Networks, 2013, 57(3): 811-824.

DOI: 10.1016/j.comnet.2012.10.002

Google Scholar

[8] Chen W H, Hsu S H, Shen H P. Application of SVM and ANN for intrusion detection. Computers & Operations Research, 2005, 32(10): 2617-2634.

DOI: 10.1016/j.cor.2004.03.019

Google Scholar

[9] Rao X, Dong C X, Yang S Q. An intrusion detection system based on support vector machine. Journal of Software, 2003, 4(14).

Google Scholar

[10] Li Y, Guo L. An active learning based TCM-KNN algorithm for supervised network intrusion detection. Computers & security, 2007, 26(7): 459-467.

DOI: 10.1016/j.cose.2007.10.002

Google Scholar

[11] Li Y, Xia J, Zhang S, et al. An efficient intrusion detection system based on support vector machines and gradually feature removal method. Expert Systems with Applications, 2012, 39(1): 424-430.

DOI: 10.1016/j.eswa.2011.07.032

Google Scholar

[12] Parkinson J, Blaxter M. SimiTri—visualizing similarity relationships for groups of sequences. Bioinformatics, 2003, 19(3): 390-395.

DOI: 10.1093/bioinformatics/btf870

Google Scholar

[13] Tsai, Chih-Fong, and Chia-Ying Lin. A triangle area based nearest neighbors approach to intrusion detection., Pattern Recognition, 2010, 43. 1: 222-229.

DOI: 10.1016/j.patcog.2009.05.017

Google Scholar

[14] Luo B, Xia J. A novel intrusion detection system based on feature generation with visualization strategy. Expert Systems with Applications, 2014. (In press).

DOI: 10.1016/j.eswa.2013.12.048

Google Scholar