Identification of New Connections for IP Intrusion Detections using WEKA Platform and KDD
نویسنده
چکیده
Intrusion detection is an essential mechanism to protect computer systems from many attacks. Clustering is the most acceptable technique to regroup the raw data into clusters but it cannot identify them. In this paper, we present a technique for the identification of unknown TCP connections using K-mean WEKA-based. Specifically, we built mixture models using KDD cup 99 and our traffic traces cancroids approach to find component behavior patterns (forensics). In this paper, we presented a six-step method for identifying the organization connections into a normal class or one of the major attack categories i.e. DoS, Probe, R2L, U2R. The validation of the semi-supervised algorithm was conducted for testing the accuracy of our methodology. The evaluation process yields outstanding results. Only the attack U2R has 80% of output similarity, but other categories have 100% of output similarities. Finally, we generated recommendations and some avenues for future research.
منابع مشابه
Intrusion Detection in IOT based Networks Using Double Discriminant Analysis
Intrusion detection is one of the main challenges in wireless systems especially in Internet of things (IOT) based networks. There are various attack types such as probe, denial of service, remote to local and user to root. In addition to known attacks and malicious behaviors, there are various unknown attacks that some of them have similar behavior with respect to each other or mimic the norma...
متن کاملA Hybrid Framework for Building an Efficient Incremental Intrusion Detection System
In this paper, a boosting-based incremental hybrid intrusion detection system is introduced. This system combines incremental misuse detection and incremental anomaly detection. We use boosting ensemble of weak classifiers to implement misuse intrusion detection system. It can identify new classes types of intrusions that do not exist in the training dataset for incremental misuse detection. As...
متن کاملAn Efficient NIDS by using Hybrid Classifiers Decision Tree & Decision Rules
In the field of internet, network based application plays a vital role, where data transfers mostly in digital forms in various formats from source to destinations. In this digital exchange of information there are several possibilities of attacks and vulnerabilities. Intrusion detection systems are widely used to protect networks. An efficient detection of intrusion from network data set is a ...
متن کاملA hybridization of evolutionary fuzzy systems and ant Colony optimization for intrusion detection
A hybrid approach for intrusion detection in computer networks is presented in this paper. The proposed approach combines an evolutionary-based fuzzy system with an Ant Colony Optimization procedure to generate high-quality fuzzy-classification rules. We applied our hybrid learning approach to network security and validated it using the DARPA KDD-Cup99 benchmark data set. The results indicate t...
متن کاملUsage of Machine Learning for Intrusion Detection in a Network
Increase in volume and intensity of network attacks, forcing the business systems to revamp their network security solutions in order to avoid huge financial losses. Intrusion Detection Systems are one of the most essential security solutions in order to ensure the security of any network. Considering huge volumes of network data and complex nature of intrusions, the performance optimization of...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2015