Open Access   Article Go Back

A Hybrid Approach for User to Root and Remote to Local Attack

R. Richhariya1 , A.K. Manjhwar2 , R. R. Singh Makwana3

  1. Dept. of CSE/IT, Madhav Institute of Technology and Science, Gwalior, India.
  2. Dept. of CSE/IT, Madhav Institute of Technology and Science, Gwalior, India.
  3. Dept. of CSE/IT, Madhav Institute of Technology and Science, Gwalior, India.

Correspondence should be addressed to: yadakada@gmail.com.

Section:Research Paper, Product Type: Journal Paper
Volume-5 , Issue-6 , Page no. 73-79, Jun-2017

Online published on Jun 30, 2017

Copyright © R. Richhariya, A.K. Manjhwar, R. R. Singh Makwana . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: R. Richhariya, A.K. Manjhwar, R. R. Singh Makwana, “A Hybrid Approach for User to Root and Remote to Local Attack,” International Journal of Computer Sciences and Engineering, Vol.5, Issue.6, pp.73-79, 2017.

MLA Style Citation: R. Richhariya, A.K. Manjhwar, R. R. Singh Makwana "A Hybrid Approach for User to Root and Remote to Local Attack." International Journal of Computer Sciences and Engineering 5.6 (2017): 73-79.

APA Style Citation: R. Richhariya, A.K. Manjhwar, R. R. Singh Makwana, (2017). A Hybrid Approach for User to Root and Remote to Local Attack. International Journal of Computer Sciences and Engineering, 5(6), 73-79.

BibTex Style Citation:
@article{Richhariya_2017,
author = {R. Richhariya, A.K. Manjhwar, R. R. Singh Makwana},
title = {A Hybrid Approach for User to Root and Remote to Local Attack},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {6 2017},
volume = {5},
Issue = {6},
month = {6},
year = {2017},
issn = {2347-2693},
pages = {73-79},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=1305},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=1305
TI - A Hybrid Approach for User to Root and Remote to Local Attack
T2 - International Journal of Computer Sciences and Engineering
AU - R. Richhariya, A.K. Manjhwar, R. R. Singh Makwana
PY - 2017
DA - 2017/06/30
PB - IJCSE, Indore, INDIA
SP - 73-79
IS - 6
VL - 5
SN - 2347-2693
ER -

VIEWS PDF XML
703 463 downloads 469 downloads
  
  
           

Abstract

With the monstrous grow in the usage of computers and Internet for information sharing, success of applications running on various platforms causes a serious risk to the security policy. Complex behavior of malwares are also increase, the mechanism to catch malwares also needs improvement. The challenges grow towards the network security due to the introduction of new attacks. This paper emphasize on a hybrid data-mining approach based on ensemble classifier. This preferred approach gives a hybrid classifier which improves the overall detection rate. Preferred approach gives more accuracy and decrease the false positive rate. With this preferred approach the classification accuracy is 99.9894% and the false positive rate is about 0.00. The comparison of preferred approach is made with the single best classifier and it is perceived that the preferred approach gives better results for User to Root (U2R) and Remote to Local (R2L) attack that present in NSL KDD intrusion dataset. This approach gives better results for Root-kit attack.

Key-Words / Index Term

Intrusion detection system (IDS), false positive rate, NSL-KDD Data set

References

[1] R. Venkatesan, “A Survey on Wireless Intrusion Detection using Data Mining Techniques”, International Journal of Innovative Research in Advanced Engineering (IJIRAE) Volume. 1, Issue. 1, 2014.
[2] M. Gyanchandani, J.L.Rana, R.N.Yadav, “Taxonomy of Anomaly Based Intrusion Detection System: A Review”, International Journal of Scientific and Research Publications, Volume 2, Issue 12, 2012.
[3] N. V. Chawla, K. W. Bowyer, L. O. Hall, W. P. Kegelmeyer, “SMOTE: Synthetic Minority Over-sampling Technique”, Journal of Artificial Intelligence Research, Volume 16, pp. 321–357, 2002.
[4] S. L. Pundir, A. Amrit, “Feature Selection Using Random Forest In Intrusion Detection System”, International Journal of Advances in Engineering & Technology, Volume 6, Issue 3, pp. 1319-1324, 2013.
[5] Y. Yang, L. Gao, Y. B. Yuan, K. McLaughlin, S. Sezer, “Multidimensional Intrusion Detection System for IEC 61850 based SCADA Networks”, IEEE ,Volume 32, Issue 2, pp. 1068-1078, 2016.
[6] M. B. Shahbaz, X. Wang, A. Behnad and J. Samarabandu, “On Efficiency Enhancement of the Correlation-based Feature Selection for Intrusion Detection Systems” , In the proceedings of the 2016 IEEE 7th Annual Information Technology, Electronics and Mobile Communication Conference(IEMCON), Canada, pp. 1-7, 2016.
[7] M. A. Iftikhar, M. Hassan, H. Alquhayz, “A colon cancer grade prediction model using texture and statistical features SMOTE and MRMR”, In the proceeding of IEEE 2016 19th International Multi-Topic Conference(INMIC), Pakistan , pp.1-7, 2016.
[8] M. F. Naufal, S. Rochimah, “Software Complexity Metric-based Defect Classification Using FARM with Preprocessing Step CFS and SMOTE”, International Conference on Information Technology Systems and Innovation (ICITSI) ,Bandung – Bali, pp.16–19, 2015
[9] D. H. Deshmukh, T. Ghorpade, P. Padiya, “Improving Classification Using Preprocessing and Machine Learning Algorithms on NSL-KDD Dataset” International Conference on Communication, Information & Computing Technology (ICCICT), India, pp. 245 , 2015
[10] D.P.Gaikwad, R. C. Thool, “Intrusion Detection System Using Bagging Ensemble Method of Machine Learning”, In the proceeding of IEEE International Conference on Computing Communication Control and Automation, India, 2015
[11] S. Chaudhary, A. Bhowal, “Comparative analysis of machine learning algorithms along with classifiers for network intrusion detection system”, In the proceeding of IEEE 2015International Conference on Smart Technologies and Management for Computing, Communication, Controls, Energy and Materials (ICSTM), pp.89-95, 2015
[12] A. Tesfahun, D. L. Bhaskari, “Intrusion Detection using Random Forests Classifier with SMOTE and Feature Reduction”, In the proceeding of IEEE International Conference on Cloud & Ubiquitous Computing & Emerging Technologies, pp. 127-132, 2013
[13] D. K. Dagly, R.V. Gori, R.R. Kamath, D. Sharma, “Hybrid Intrusion Detection System Using K-Means Algorithm”, International Journal of Computer Science and Engineering, Volume 4, Issue 3, pp. 82-85,2016.