An Effective Approach for Improving Anomaly Intrusion Detection
Kumar J S1 , Appa Rao S S V2 , Subha Sree M3
Section:Review Paper, Product Type: Journal Paper
Volume-3 ,
Issue-10 , Page no. 92-98, Oct-2015
Online published on Oct 31, 2015
Copyright © Kumar J S, Appa Rao S S V, Subha Sree M . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Citation
IEEE Style Citation: Kumar J S, Appa Rao S S V, Subha Sree M, “An Effective Approach for Improving Anomaly Intrusion Detection,” International Journal of Computer Sciences and Engineering, Vol.3, Issue.10, pp.92-98, 2015.
MLA Citation
MLA Style Citation: Kumar J S, Appa Rao S S V, Subha Sree M "An Effective Approach for Improving Anomaly Intrusion Detection." International Journal of Computer Sciences and Engineering 3.10 (2015): 92-98.
APA Citation
APA Style Citation: Kumar J S, Appa Rao S S V, Subha Sree M, (2015). An Effective Approach for Improving Anomaly Intrusion Detection. International Journal of Computer Sciences and Engineering, 3(10), 92-98.
BibTex Citation
BibTex Style Citation:
@article{S_2015,
author = {Kumar J S, Appa Rao S S V, Subha Sree M},
title = {An Effective Approach for Improving Anomaly Intrusion Detection},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {10 2015},
volume = {3},
Issue = {10},
month = {10},
year = {2015},
issn = {2347-2693},
pages = {92-98},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=712},
publisher = {IJCSE, Indore, INDIA},
}
RIS Citation
RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=712
TI - An Effective Approach for Improving Anomaly Intrusion Detection
T2 - International Journal of Computer Sciences and Engineering
AU - Kumar J S, Appa Rao S S V, Subha Sree M
PY - 2015
DA - 2015/10/31
PB - IJCSE, Indore, INDIA
SP - 92-98
IS - 10
VL - 3
SN - 2347-2693
ER -
![]() |
![]() |
![]() |
2555 | 2378 downloads | 2634 downloads |




Abstract
Intrusion Detection Systems (IDS) is a key part of system defense, where it identifies abnormal activities happening in a computer system. In general, the traditional intrusion detection relies on the extensive knowledge of security experts, in particular, on their familiarity with the computer system to be protected. To reduce this dependence, various data-mining, soft-computing and machine learning techniques have been proposed in recent years for the development of better intrusion detection systems. Many researchers used Conditional Random Fields and Layered Approach for purpose of intrusion detection. They also demonstrated that high attack detection accuracy can be achieved by using Conditional Random Fields and high efficiency by implementing the Layered approach. In the paper we explained a new method called fuzzy ARTMAP classifier (FAM) and clustering technique for effectively identifying the intrusion activities within a network. Processing huge data would make the system error prone, hence clustering the data into groups and then processing will result in having a better system. From each of the cluster, representative data is selected in the selective process for further processing. For classification process, layered fuzzy ARTMAP will have the better results when compared to other normal classifier algorithms. Finally the experiments and evaluations of the proposed intrusion detection system is using the KDD Cup 99 intrusion detection data set.
Key-Words / Index Term
Intrusion Detection System, Layered approach, Clustering, FAM
References
[1] Yao, J. T., S.L. Zhao, and L.V. Saxton, “A Study On Fuzzy Intrusion Detection”, In Proceedings of the Data Mining, Intrusion Detection, Information Assurance, And Data Networks Security, SPIE, Vol. 5812, pp. 23-30 ,28 March - 1 April, Orlando, Florida, USA, 2005.
[2] Nivedita Naidu and Dr.R.V.Dharaskar, “An Effective Approach to Network Intrusion Detection System using Genetic Algorithm”, International Journal of Computer Applications, Vol.1, No.3, pp.26–32, February 2010.
[3] Peyman Kabiri and Ali A. Ghorbani. Research on Intrusion Detection and Response: A Survey. International Journal of Network Security, 1(2):84–102, 2005
[4] B Mukherjee, L Todd Heberlein, K N Levitt, 1994. “Network intrusion detection. IEEE Network, Vol. 8, No. 3, pp.26–41,1994.
[5] J. Allen, A. Christie, and W. Fithen, “State Of the Practice of Intrusion Detection Technologies”, Technical Report, CMU/SEI-99-TR-028, 2000.
[6] Kapil Kumar Gupta, Baikunth Nath and Ramamohanarao Kotagiri, “Layered Approach Using Conditional Random Fields for Intrusion Detection”, IEEE Transactions on Dependable and Secure Computing, Vol. 7, No. 1, 2010.
[7]G. Gowrisona, K. Ramarb, K. Muneeswaranc, T. Revathic, " Minimal complexity attack classification intrusion detection system", Applied Soft Computing, vol 13, pp: 921–927, 2013.
[8]Shingo Mabu, Nannan Lu, Kaoru Shimada,KotaroHirasawa, " An Intrusion-Detection Model Based on Fuzzy Class-Association-Rule Mining Using Genetic Network Programming", IEEE Transactions On Systems, Man, And Cybernetics—Part C: Applications And Reviews, VOL. 41, NO. 1, PP: 130-139 , 2011
[9] Latifur Khan, MamounAwad, BhavaniThuraisingham, “A new intrusion detection system using support vector machines and hierarchical clustering”, The International Journal on Very Large Data Bases, Vol. 16, no. 4, October 2007.
[10] M. Bahrololum, E. Salahi and M. Khaleghi “Anomaly intrusion detection design using hybrid of unsupervised and supervised neural networks”, International Journal of Computer Networks & Communications, Vol.1, No.2, 2009.
[11] K.S. Anil Kumar and Dr. V. NandaMohan, " Novel Anomaly Intrusion Detection Using Neuro-Fuzzy Inference System ", IJCSNS International Journal 6 of Computer Science and Network Security, vol.8, no.8, pp.6-11 , August 2008.
[12] Shekhar R. Gaddam, Vir V. Phoha, Kiran S. Balagani, “K-Means+ID3: A Novel Method for Supervised Anomaly Detection by Cascading K-Means Clustering and ID3 Decision Tree Learning Methods”, IEEE Transactions on Knowledge and Data Engineering, Vol. 19, No. 3, pp. 345-354, 2007.
[13] Vipin Kumar, Himadri Chauhan and Dheeraj Panwar, “K-Means Clustering Approach to Analyze NSL-KDD Intrusion Detection Dataset” International Journal of Soft Computing and Engineering (IJSCE), pp. 2231-2307, Volume-3, Issue-4, September 2013
[14] Rachnakulhare and Divakar Singh, “Intrusion Detection System based on Fuzzy C Means Clustering and Probabilistic Neural Network”, International Journal of Computer Applications, Vol. 74, No.2, 2013.
[15]KDD Cup 1999. Available on: http://kdd.ics.uci.edu/databases/kddcup 99/kddcup99.html, Ocotber 2007.
[16] Jaskaranjit Kaur and Gurpreet Kaur, “Clustering Algorithms in Data Mining: A Comprehensive Study”, International Journal of Computer Science and Engineering , vol. 3 Issue.7, pp 57-61, July 2015.