An intrusion detection system based on combining probability predictions of a tree of classifiers

被引:36
作者
Ahmim, Ahmed [1 ]
Derdour, Makhlouf [1 ]
Ferrag, Mohamed Amine [2 ]
机构
[1] Univ Larbi Tebessi, Fac Exact Sci & Sci Nat & Life, Dept Math & Comp Sci, Route Constantine, Tebessa 12002, Algeria
[2] Guelma Univ, Dept Comp Sci, Fac Math Comp Sci & Mat Sci, BP 401, Guelma 24000, Algeria
关键词
computer security; data mining; hybrid IDS; hierarchical IDS; intrusion detection system; IDS; network security;
D O I
10.1002/dac.3547
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Intrusion detection system (IDS) represents an unavoidable tool to secure our network. It is considered as a second defense line against the different form of attacks. The principal limits of the current IDSs are their inability to combine the detection of the new form of attacks with high detection rate and low false alarm rate. In this paper, we propose an intrusion detection system based on the combination of the probability predictions of a tree of classifiers. Specifically, our model is composed of 2 layers. The first one is a tree of classifiers. The second layer is a classifier that combines the probability predictions of the tree. The built tree contains 4 levels where each node of this tree represents a classifier. The first node classifies the connections in 2 clusters: Denial of Service attacks and Cluster 2. Then, the second node classifies the connections of the Cluster 2 in Probing attacks and Cluster 3. The third node classifies the connections of the Cluster 3 in Remote-to-Local attacks and Cluster 4. Finally, the last node classifies the connections of the Cluster 4 in User-to-Root attacks and Normal connections. The second layer contains the last classifier that combines the probability predictions of the first layer and take the final decision. The experiments on KDD'99 and NSL-KDD show that our model gives a low false alarm rate and the highest detection rate. Furthermore, our model is more precise than the recent intrusion detection system models with accuracy equal to 96.27% for KDD'99 and 89.75% for NSL-KDD.
引用
收藏
页数:17
相关论文
共 50 条
[1]   A New Fast and High Performance Intrusion Detection System [J].
Ahmim, Ahmed ;
Ghoualmi-Zine, Nacira .
INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2013, 7 (05) :67-80
[2]   FuzMet: a fuzzy-logic based alert prioritization engine for intrusion detection systems [J].
Alsubhi, Khalid ;
Aib, Issam ;
Boutaba, Raouf .
INTERNATIONAL JOURNAL OF NETWORK MANAGEMENT, 2012, 22 (04) :263-284
[3]  
[Anonymous], 1998, P AAAI 98 WORKSH LEA, DOI DOI 10.1109/TSMC.1985.6313426
[4]  
[Anonymous], 2009, NSL KDD
[5]  
[Anonymous], 1999, KDD CUP 1999 DATA
[6]  
[Anonymous], 1998, P NAT INF SYST SEC C
[7]  
Axelsson S, 2000, taxonomy. TechIntrusion detection systems: A survey and nical Report, P1
[8]   Multi-class pattern classification using single, multi-dimensional feature-space feature extraction evolved by multi-objective genetic programming and its application to network intrusion detection [J].
Badran, Khaled ;
Rockett, Peter .
GENETIC PROGRAMMING AND EVOLVABLE MACHINES, 2012, 13 (01) :33-63
[9]  
Bishop C.M., 1995, Neural networks for pattern recognition
[10]   Random forests [J].
Breiman, L .
MACHINE LEARNING, 2001, 45 (01) :5-32