Open Access   Article Go Back

A Hybrid Intrusion Detection System Using Hypper-Pipe Classifier and Ant Colony Optimization

K Shukla1 , R K Gupta2 , V. Namdeo3

Section:Research Paper, Product Type: Journal Paper
Volume-6 , Issue-11 , Page no. 376-380, Nov-2018

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i11.376380

Online published on Nov 30, 2018

Copyright © K Shukla, R K Gupta, V. Namdeo . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: K Shukla, R K Gupta, V. Namdeo, “A Hybrid Intrusion Detection System Using Hypper-Pipe Classifier and Ant Colony Optimization,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.11, pp.376-380, 2018.

MLA Style Citation: K Shukla, R K Gupta, V. Namdeo "A Hybrid Intrusion Detection System Using Hypper-Pipe Classifier and Ant Colony Optimization." International Journal of Computer Sciences and Engineering 6.11 (2018): 376-380.

APA Style Citation: K Shukla, R K Gupta, V. Namdeo, (2018). A Hybrid Intrusion Detection System Using Hypper-Pipe Classifier and Ant Colony Optimization. International Journal of Computer Sciences and Engineering, 6(11), 376-380.

BibTex Style Citation:
@article{Shukla_2018,
author = {K Shukla, R K Gupta, V. Namdeo},
title = {A Hybrid Intrusion Detection System Using Hypper-Pipe Classifier and Ant Colony Optimization},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {11 2018},
volume = {6},
Issue = {11},
month = {11},
year = {2018},
issn = {2347-2693},
pages = {376-380},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=3172},
doi = {https://doi.org/10.26438/ijcse/v6i11.376380}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i11.376380}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=3172
TI - A Hybrid Intrusion Detection System Using Hypper-Pipe Classifier and Ant Colony Optimization
T2 - International Journal of Computer Sciences and Engineering
AU - K Shukla, R K Gupta, V. Namdeo
PY - 2018
DA - 2018/11/30
PB - IJCSE, Indore, INDIA
SP - 376-380
IS - 11
VL - 6
SN - 2347-2693
ER -

VIEWS PDF XML
653 321 downloads 245 downloads
  
  
           

Abstract

The goal of building Intrusion Detection System is conceptualized with need of making secure and protected publically and privately accessible data so that it can be easily avoided from its unauthorized uses. Since increase of network density and heavy use of development of internet has generated a major challenge of making these network data and traffic protected from intruded attacks. Security of network traffic is becoming a major issue of computer network system. Attacks on the network are increasing day-by day. The most publicized attack on network traffic is considered as Intrusion. Data mining techniques are used to monitor and analyze large amount of network data & classify these network data into anomalous and normal data. Since data comes from various sources, network traffic is large. Data mining techniques such as classification and clustering are applied to build Intrusion Detection system. An effective Intrusion detection system requires high detection rate, low false alarm rate as well as high accuracy. This research paper includes effective Data mining techniques applied on IDS for the effective detection of pattern for both malicious and normal activities in network by strong classification mechanism, it will simplify the task of securing information system through this proposed Intrusion Detection system which is developed by the optimized use of newly Ant Colony optimization followed by Hyper pipes classifier classification. Intrusion detection system has been used for ascertaining intrusion and to preserve the security goals of information from attacks.

Key-Words / Index Term

Accuracy, Attack, Ant Colony, Classifier, Clustering, Data mining, Detection, Information, Intrusion, Signature, optimization,etc.

References

[1] Weiwei Chen, Fangang Kong, Feng Mei, Guigin Yuan, Bo Li, "a novel unsupervised Anamoly detection Approach for Intrusion Detection System", 2017 IEEE 3rd International Conference on big data security on cloud, May 16–18, 2017.
[2] S. Aljawarneh, M. Aldwairi, M.B. Yassein, "Anomaly-based intrusion detection system through feature selection analysis and building hybrid efficient model", Journal of Computational Science, 2017.
[3] J. Yang, T. Deng, R. Sui, "An adaptive weighted one-class svm for robust outlier detection", Proceedings of the 2015 Chinese Intelligent Systems Conference, pp. 475-484, 2016
[4] Anbar Mohammed, Abdulah Rosni, H. Hasbullah Izan, Yung-Wey Chong, E. Elejla Omar, "Comparative Performance Analysis of classification algorithm for Internal Intrusion Detection", 2016 14th Annual Conference on Privacy Security and Trust (PCT), Dec 12–14, 2016.
[5] Mariem Belhor, Farah Jemili, "Intrusion Detection based on genetic fuzzy classification system", 2016 IEEE 13th International Conference on Computer Systems and Application (AICCSA), Nov 29 2016-Dec 2, 2016.
[6] Anbar Mohammed, Abdulah Rosni, H. Hasbullah Izan, Yung-Wey Chong, E. Elejla Omar, "Comparative Performance Analysis of classification algorithm for Internal Intrusion Detection", 2016 14th Annual Conference on Privacy Security and Trust (PCT), Dec 12–14, 2016.
[7] Gong Shang-fu ; Zhao Chun-lan,Intrusion detection system based on classification, IEEE International Conference on Intelligent Control, Automatic Detection and High-End Equipment,2012.
[8] J.H. Lee, J.H. Lee, S.G. Sohn, J.H. Ryu, T.M. Chung, "Effective value of decision tree with KDD 99 intrusion detection datasets for intrusion detection system", Advanced Communication Technology 2008 ICACT 2008 10th International Conference on, vol. 2, pp. 1170-1175, 2008.
[9] ShailendraSahu and B M Mehtre ,"Network Intrusion Detection System Using J48 Decision Tree," IEEE , 2015.
[10] Sara Chadli,Mohamed Emharraf and Mohammed Saber "The design of an IDS architecture for MANET based on multi-agent" International Colloquium on Information Science and Technology (CiSt),IEEE,2014.
[11] Difan Zhang, Linqiang Ge, Rommie Hardy, Authersi Yu, Hanlin Zhang and Robert Reschly, "On Effective Data Aggregation Techniques In Host-based Intrusion Detection in MANET," The 10th Annual IEEE CCNC- Green Communications and Computations Track 2013 IEEE.
[12] Jitendra S Rathore, Praneet Saurabh, Bhupendra Verma “AgentOuro: A Novelty Based Intrusion Detection and Prevention System” Computational Intelligence and Communication Networks (CICN), 2012 Fourth International Conference on 3-5 Nov. 2012.
[13] Vasima Khan, Anomaly Based Intrusion Detection And Prevention System, IJERT, 2013.
[14] Mukesh Sharma,Akhil Kaushik, Amit Sangwan Performance Analysis of Real Time Intrusion Detection and Prevention System using Snort.,IJERT, 2012 .
[15] Vaishali T.Deshmukh, Shubhangi Vaikole, Layered Crf A Model To Build More Accurate Intrusion Detection System, IJERT, 2012.
[16] Bhavana G.Rathwa,Prof.Purnima Singh Genetic Algorithm Methodology for Intrusion Detection System, IJERT, 2012.
[17] Bin Zeng , Lu Yao and ZhiChen Chen"A network intrusion detection system with the snooping agents",International Conference on Computer Application and System Modeling, 2010.
[18] Vera Marinova-Boncheva, “A Short Survey of Intrusion Detection Systems”, Problems of Engineering Cybernetics and Robotics, 2007.
[19] A. Moore, D. Zuev and M. Crogan, "Descriminators for use in flow based Classification," Queen Marry University of London, August 2005.
[20] Khaled Labib, Computer security and intrusion detection, Crossroads, Volume 11, Issue 1, August 2004.
[21] Yong Zhong, Xiao-lin Qin, Database Intrusion Detection Based on User Query Frequent Itemsets Mining with Item Constraints [J], Proceedings of the 3rd international conference on information security, 2004.
[22] Dheeraj Gupta ; P.S. Joshi ; A.K. Bhattacharjee ; R.S. Mundada, IDS alerts classification using knowledge-based evaluation, Fourth International Conference on Communication Systems and Networks (COMSNETS 2012).
[23] David Ahmad Effendy ; Kusrini Kusrini, Classification of intrusion detection system (IDS) based on computer network; Sudarmawan Sudarmawan, 2nd International conferences on Information Technology, Information Systems and Electrical Engineering (ICITISEE) 2017.
[24] Murthy, S.K. , Automatic Construction of Decision Trees from Data: A Multi-Disciplinary Survey. Data Mining and Knowledge Discovery, 24, 1998.
[25] I Nyoman, Trisna Wirawan, I. E., "Penerapan Naive Bayes Pada Intrusion Detection System Dengan Diskritisasi Variabel", Jurnal Ilmiah Teknologi Informasi, vol. 2, 2015.
[26] Aurobindo Sundaram, An Introduction to Intrusion Detection, Crossroads, Volume 2, Issue 4, Pages: 3 –7, 1996.
[27] Northcutt, S. “Network Intrusion Detection: An Analyst’s Handbook.” New Riders, Indianapolis 1999.
[28] Akthar, F. and Hahne, C. Rapid Miner 5 Operator Reference, 2012.
[29] KDD99, KDDCup 1999 data, 1999, http://kdd.ics.uci.edu/ Databases/kddcup99/10 percent.gz, 1999.
[30] S. Zaman S., F. Karray. Fuzzy ESVDF approach for Intrusion Detection System. The IEEE 23 International Conference on Advanced Information Networking and Applications (AINA-09), Page(s): 539-545, 26-29 May 2009.