36
Views
35
CrossRef citations to date
0
Altmetric
Original Articles

A two-stage hybrid classification technique for network intrusion detection system

, &
Pages 863-875 | Received 17 Apr 2015, Accepted 19 May 2016, Published online: 28 Sep 2016

References

  • C. E. Landwehr, A. R. Bull, J. P. McDermott and W. S. Choi, A taxonomy of computer program security flaws, ACM Computer Survey. 26(3) (1994) 211–254. doi: 10.1145/185403.185412
  • B. Schneier, Secrets and Lies: Digital Security in a Networked World, (John Wiley & Sons, Inc., Indianapolis, Indiana, 2000)
  • E. Amorso, Intrusion Detection: An Introduction to Internet Surveillance, Correlation, Trace Back, Traps, and Response, 1st edn. (AT&T Inc. 1999)
  • A. Agovic, A. Banerjee, A. R. Ganguly and V. Protopopescu, Anomaly detection using manifold embedding and its applications in transportation corridors, Intelligent Data Analysis Knowledge Discovery from Data Streams. 13(3) (2009) 435–455.
  • J. McHugh, Testing intrusion detection systems: a critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln laboratory, ACM Transactions on Information and System Security, 3(4) (2000) 262–294. doi: 10.1145/382912.382923
  • A. Lazarevic, L. Ertoz, V. Kumar, A. Ozgur and J. Srivastava, A comparative study of anomaly detection schemes in network intrusion detection, in Proc. 3rd SAIM Int. Conf. on Data Mining (2003), pp. 25–36.
  • O. Depren, M. Topallar, E. Anarim and M. K. Ciliz, An intelligent intrusion detection system (IDS) for anomaly and misuse detection in computer networks, Expert Systems with Applications. 29 (2005) 713–722. doi: 10.1016/j.eswa.2005.05.002
  • G. Kim, S. Lee and S. Kim, A novel hybrid intrusion detection method integrating anomaly detection with misuse detection, Expert Systems with Applications. 41 (2014) 1690–1700. doi: 10.1016/j.eswa.2013.08.066
  • T. F. Ghanem, W. S. Elkilani and H. M. Abdul-kader, A hybrid approach for efficient anomaly detection using metaheuristic methods, Journal of Advanced Research. 6(4) (2015) 609–619. doi: 10.1016/j.jare.2014.02.009
  • M. Panda and M. R. Patra, Network intrusion detection using nave Bayes, International Journal of Computer Science and Network Security. 7(12) (2007) 258–263.
  • S. Zaman and F. Karray, Features selection for intrusion detection systems based on support vector machines, in Proc. 6th IEEE Conference on Consumer Communications and Networking Conference (Las Vegas, NV, 2009), pp. 1–8.
  • K. M. Faroun and A. Boukelif, Neural network learning improvement using k-means clustering algorithm to detect network intrusions, International Journal of Computational Intelligence. 3(2) (2007) 161–168.
  • S. W. Lin, K. C. Ying, C. Y. Lee and Z. J. Lee, An intelligent algorithm with feature selection and decision rules applied to anomaly intrusion detection, Applied Soft Computing. 12 (2012) 3285–3290. doi: 10.1016/j.asoc.2012.05.004
  • M. Sabhnani and G. Serpen, Application of machine learning algorithms to KDD intrusion detection dataset within misuse detection context, in Proc. Int. Conf. on Machine Learning: Models, Technologies, and Applications (Las Vegas, Nevada, USA, 2003), pp. 209–215.
  • Y. Y. Chung and N. Wahid, A hybrid intrusion detection system using simplified swarm optimization (SSO), Applied Soft Computing. 12(9) (2012) 3014–3022. doi: 10.1016/j.asoc.2012.04.020
  • J. Hussain and S. Lalmuanawma, A hybrid approach for determining the efficient network intrusion detection system, The IUP Journal of Computer Sciences. 8(3) (2014) 34–46.
  • J. Hussain and S. Lalmuanawma, An intelligent hybrid decision approach with feature selection for anomaly network intrusion detection system, in Proc. 5th Int. Conf. on Internet Technologies and Society (Taiwan, 2014), pp. 3–10.
  • M. Panda, A. Abraham and M. R. Patra, A hybrid intelligent approach for network intrusion detection, in Proc. Int. Conf. on Communication Technology and System Design, (2012). 30, pp. 1–9.
  • C. Bae, W. C. Yeh, W. M. Shukran, Y. Y. Chung and T. J. Hsieh, A novel anomaly-network intrusion detection system using ABC algorithms, International Journal of Innovative Computing, Information and Control. 8(12) (2012) 8231–8248.
  • M. Tavallaee, E. Bagheri, W. Lu and A. A. Ghorbani, A detailed analysis of the KDD Cup datasets, in Proc. 2nd IEEE Symposium on computational intelligence in security and defense applications (2009), pp. 53–58.
  • KDD Cup’99 Data, http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html
  • B. E. Boser, I. M. Guyon, V. N. Vapnik, A training algorithm for optimal margin classifiers, in Proc. 5th Annual Workshop on Computational Learning Theory, (AMC press, 1992), pp. 144-152.
  • C. C. Chang and C. J. Lin, LIBSVM: A library for support vector machines, ACM Transactions on Intelligent Systems and Technology. 2(3) (2011). Software available at http://www.csie.ntu.edu.tw/~cjlin/libsvm doi: 10.1145/1961189.1961199
  • C. Cortes and V. Vapnik, Support-vector network, Machine Learning. 20 (1995) 273–297.
  • M. Sammany, M. Sharawi, E. M. Beltagy and I. Saroit, Artificial Neural Networks Architecture for Intrusion Detection Systems and Classification of Attacks, in Proc. 5th Int. Conf. INFO2007 (Cairo University, 2007).
  • M. M. T. Jawhar and M. Mehrotra, Design Network Intrusion Detection System using hybrid Fuzzy-Neural Network, International Journal of Computer Science and Security. 4(3) (2010) 285–294.
  • D. Novikov, R. V. Yampolskiy and L. Reznik, Artificial Intelligence Approaches for Intrusion Detection, in Proc. IEEE Int. Conf. on Systems, Applications and Technology, (Long Island, New York, 2006).
  • L. S. Silva, A. C. Santos, J. D. S. Silvas and A. Montes, A Neural Network Application for Attack Detection in Computer Networks, in Proc. Int. Joint Conf. on Neural Networks (Budapest, 2004). 2, pp. 1569–1574.
  • M. Bahrololum, E. Salahi and M. Khaleghi, An Improved Intrusion detection technique based on two strategies using Decision Tree and Neural Network, Journal of Convergence Information Technology. 4(4) (2009) 96–101. doi: 10.4156/jcit.vol4.issue4.14
  • K. Shihab, A Backpropagation neural network for computer network security, Journal of Computer Science. 2(9) (2006) 710–715. doi: 10.3844/jcssp.2006.710.715
  • S. X. Wu and W. Banzhaf, The use of computational intelligence in intrusion detection system: a review, Applied Soft Computing. 10(1) (2010) 1–35. doi: 10.1016/j.asoc.2009.06.019
  • A. Yousef, K. Goran, G. Slavko and J. Zoran, FlowBased anomaly intrusion detection system using two neural network stages, Computer Science and Information Systems. 11(2) (2014) 601–622. doi: 10.2298/CSIS130415035A
  • A. Khan, S. Khan, Two level anomaly detection classifier, in Proc. Int. Conf. on Computer and Electrical Engineering (Phuket, 2008), pp. 65–69.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.