Mutual Clustered Redundancy and Composite Learning for Intrusion Detection Systems

Mutual Clustered Redundancy and Composite Learning for Intrusion Detection Systems

Thotakura Veeranna, R. Kiran Kumar
Copyright: © 2023 |Pages: 25
DOI: 10.4018/IJeC.316772
Article PDF Download
Open access articles are freely available for download

Abstract

In the area of cyber space security, intrusion detection is a challenging task which aims at the provision of security from various malicious attacks. Hence, this paper proposes a two-stage hybrid intrusion detection system (IDS) mechanism to identify between normal and attack activities. The proposed mechanism is an integrated form of two simple and effective machine learning algorithms; they are support vector machine (SVM) and composite extreme learning machine (CELM). The first stage aims to distinguish the normal activities from abnormal activities and employed SVM. Next, the second stage employs CELM for the detection of different types of attacks . Further, aiming over training data, a clustering followed by duplicate connections removal and duplicate features removal is accomplished through fuzzy C-means clustering, correlation, and mutual information respectively. The proposed method applied eventually on the standard benchmark dataset NSL-KDD and the real modern UNSW-NB15 dataset. The performance analysis validates through accuracy, false alarm rate and computational time.
Article Preview
Top

1. Introduction

In recent days, the advancement in the technology, especially with the popularity of internet, a huge demand has been arisen for different applications related to entertainment, electronic communication etc., which are the part of daily life. However, this massive advancement in the computer networks technology increased the vulnerability of cyber-attacks (Buczak & Guven, 2016). Hence the design of cyber-security has been attracted the researchers from both academic and industry. The first line of defense methods for different applications or organizations is several types. They are namely user authentication, data encryption, malware prevention and firewalls. All these methods can ensure a secure communication and prevents the organizations and enterprises from the victims of cyber-attacks (Al-Jarrah et al., 2015). To enter into an organization, attackers exploit the vulnerabilities much deliberately over the target system and launch various types of attacks those may lead to several problems like information leakage, system rupture etc. With the progress in time, these attacks threaten the availability, integrity and confidentiality of cyber systems. Hence there is a need of an effective Cyber-attacks detection mechanism to protect the systems from different kinds of security attacks.

Intrusion Detection System (IDS) (Inayat et al., 2016; Hubballi & Suryanarayanan, 2014; Khraisat et al., 2020) is one possible solution that can protect the network actively from illegal and external attacks. The main aim of IDS is to ensure the security for systems and to detect the abnormal events phenomena. Moreover, the IDS can also enhance the security and reliability of systems by analyzing and identifying the behavior of malicious activities those enter into the system. Frankly to say, IDs are the widely employed methods in several distributed systems (Wang et al., 2016), perceiving the intrusions and then taking fast countermeasures to prevent from further spreading and infections. According to the detection mechanism, the IDSs are categorizes into two categories such as the Anomaly and Misuse Detection (Joldzic et al., 2016). In cyber-security, the anomaly is defined as an event that has a deviated behavior from normal behavior. The anomaly based IDSs perform better in the detection of novel attack types, but they could not avoid the larger false positive rate (Villalba et al., 2015). On the other hand, the misuse based IDSs (Hubballi & Suryanarayanan, 2014) can detect the legitimate activities form malicious ones because they works based on the known patterns. In this kind of system, the patterns of legitimate activities are stored and if the new activity is found to have a deviated pattern from legitimate patterns, then it is identified as attack. Though this category is reliable for the detection of know attacks, it is not effective in the detection of unknown attacks.

Complete Article List

Search this Journal:
Reset
Volume 20: 1 Issue (2024)
Volume 19: 7 Issues (2023)
Volume 18: 6 Issues (2022): 3 Released, 3 Forthcoming
Volume 17: 4 Issues (2021)
Volume 16: 4 Issues (2020)
Volume 15: 4 Issues (2019)
Volume 14: 4 Issues (2018)
Volume 13: 4 Issues (2017)
Volume 12: 4 Issues (2016)
Volume 11: 4 Issues (2015)
Volume 10: 4 Issues (2014)
Volume 9: 4 Issues (2013)
Volume 8: 4 Issues (2012)
Volume 7: 4 Issues (2011)
Volume 6: 4 Issues (2010)
Volume 5: 4 Issues (2009)
Volume 4: 4 Issues (2008)
Volume 3: 4 Issues (2007)
Volume 2: 4 Issues (2006)
Volume 1: 4 Issues (2005)
View Complete Journal Contents Listing