Advertisement

Network Anomalous Intrusion Detection using Fuzzy-Bayes

  • Adetunmbi Adebayo O 
  • Zhiwei Shi
  • Zhongzhi Shi
  • Adewale Olumide S. 
Part of the IFIP International Federation for Information Processing book series (IFIPAICT, volume 228)

Abstract

Security of networking systems has been an issue since computer networks became prevalent, most especially now that Internet is changing the facie computing. Intrusions pose significant threats to the integrity, confidentiality and availability of information for the internet users. In this paper, a new approach to real-time network anomaly intrusion detection via Fuzzy-Bayesian is proposed to detect malicious activity against computer network; the framework is described to demonstrate the effectiveness of the technique. The combination of fuzzy with Bayesian classifier will improve the overall performance of Bayes based intrusion detection system (IDS). Also, the feasibility of our method is demonstrated by the experiment performed on KDD 1999 IDS data set.

Key words

intrusion detection fuzzy naïve-Bayes 

References

  1. 1.
    Alan Bivens, Chandrika Palagiri, Raheda smith, Boleslaw Szymanski, Mark Embreehts, “Network-Based Intrusion detection using Neural Networks”, www.cs.rpi.edu/~szymansk/paper/anie02.pdf Google Scholar
  2. 2.
    Ajith Abraham, Ravi Jainb, Johnson Thomas, and Sang Yong Han, “D-SCIDS: Distributed soft computing intrusion detection system”, Journal of Network and Computer Applications, Elsevier, 2005.Google Scholar
  3. 3.
    Biswanath Mukherjee, Todd L. Heberlin, and Karl N. Levitt. Network intrusion detection. IEEE Network, 8(3):26–41, 1994.CrossRefGoogle Scholar
  4. 4.
    Byunghae Cha, kyung Woo Park and Jaittyun Seo, “Neural Networks Techniques for Host Anomaly Intrusion Detection using Fixed Pattern Transformation. ICCSA 2005, LNCS 3481 pp. 254–263, 2005.Google Scholar
  5. 5.
    Susan M. Bridges and Rayford B. vaughnn, “Intrusion detection via fuzzy data mining”, Twelfth annual Canadian Information Technology Security Symposium June 19–23. The Ottawa Congress Centre.Google Scholar
  6. 6.
    Andrew H. Sung and Srinivas Mukkamala, “Identifying important features for intrusion detection using support vector machines and neural networks”. IEEE Proceedings of the 2003 Symposium on Application and the Internet (SAINT’03).Google Scholar
  7. 7.
    Jonatan Gomez and Dipankar Dasgupa “Evolving Classifiers for Intrusion Detection”, Proceedings of the 2002 IEEE Workshop on Information Assurance, United States Military Academy, West Point, NY, June 2001Google Scholar
  8. 8.
    John E. Dickerson, Jukka Juslin, Uuramia Koukousoula, and Julie A. Dickerson, “Fuzzy intrusion detection (FIRE)”, Electrical and Computer Engineering Department, IOWA state University, Ames, IA, USA. www.engJastate.edu/~julied/research.htmlGoogle Scholar
  9. 9.
    Christopher Krungel, Darren Mutz, William Robertson and Fredik Valuer, “Bayesian Event classification for intrusion detection”, Proceedings of the 19th Annual Computer Security Applications Conference (ACSAC’03), 2003Google Scholar
  10. 10.
    Miroslav Kubat and Stan Matwin, “Addressing the curse of Imbalanced Training Sets: One sided selection” Proc. 14th International Conference on Machine Learning, 1997Google Scholar
  11. 11.
    KDD Cup 1999 Data: http://kdd.ics.uci.edu/databases/kddcup99/Google Scholar

Copyright information

© International Federation for Information Processing 2006

Authors and Affiliations

  • Adetunmbi Adebayo O 
    • 1
    • 2
  • Zhiwei Shi
    • 1
  • Zhongzhi Shi
    • 1
  • Adewale Olumide S. 
    • 2
  1. 1.Key Laboratory of Intelligent Information Processing Institute of Computing TechnologyCASBeijingChina
  2. 2.Department of Computer ScienceFederal University of TechnologyOndo StateNigeria

Personalised recommendations