Abstract
A large amount of work has been done on the KDD 99 dataset, most of which include the use of a hybrid anomaly and misuse detection model done in parallel with each other. In order to further classify the intrusions, our approach to network intrusion detection includes the use of two different anomaly detection models followed by misuse detection applied to the combined output obtained from the previous step. The end goal of this is to verify the anomalies detected by the anomaly detection algorithm and clarify whether they are actually intrusions or random outliers from the trained normal (and thus to try and reduce the number of false positives). We aim to detect a pattern in this novel intrusion technique itself, and not the handling of such intrusions. The intrusions were detected to a very high degree of accuracy.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
A. Lazarevic, L. Ertoz, V. Kumar, A comparative study of anomaly detection schemes in network intrusion detection. in Proceedings of the 2003 SIAM International Conference on Data Mining (2002)
D. Barbara, N. Wu, S. Jajodia, Detecting novel network intrusions using bayes estimators. in Proceedings of the 2001 SIAM International Conference on Data Mining (2001)
S.A. Hofmeyr, S. Forrest, A. Somayaji, Intrusion detection using sequences of system calls. J. Comput. Security. 6(3), 151–180 (1998)
A. Ghosh, A. Schwartzbard, A study in using neural networks for anomaly and misuse detection. in Proceedings of the 8th USENIX Security Symposium, August 23–36,(1999), pp. 141–152
E. Eskin, W. Lee, S.J. Stolfo, Modeling system calls for intrusion detection with dynamic window sizes. in Proceedings DARPA Information Survivability Conference and Exposition II, (DISCEX’01, 2001)
R. Sekar, A. Gupta, J. Frullo. Specification-based anomaly detection: A new approach for detecting network intrusions. in CCS ‘02: Proceedings of the 9th ACM conference on Computer and communications security, November 2002, (2002), pp. 265–274
J. Zhang, M. Zulkernine, A. Haque, Random-forests-based network intrusion detection systems. in IEEE Transactions on Systems, Man, and Cybernetics—part C: Applications and Reviews, vol. 38, No. 5 (2008)
J. Cannady, Artificial neural networks for misuse detection. in National Information Systems Security Conference, (1998)
R.S. Landge, A.P. Wadh, Misuse detection system using various techniques: A review. Int. J. Adv. Res. Comput. Sci., Udaipur 4(6) (2013)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Sinha, A., Pandey, A., Aishwarya, P.S. (2021). Intrusion Detection Using a Hybrid Sequential Model. In: Patnaik, S., Yang, XS., Sethi, I. (eds) Advances in Machine Learning and Computational Intelligence. Algorithms for Intelligent Systems. Springer, Singapore. https://doi.org/10.1007/978-981-15-5243-4_1
Download citation
DOI: https://doi.org/10.1007/978-981-15-5243-4_1
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-5242-7
Online ISBN: 978-981-15-5243-4
eBook Packages: EngineeringEngineering (R0)