Encrusted CRF in Intrusion Detection System

Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 325)


Intrusion detection system’s aim is to note malicious activities in a network. But it has to tackle many challenges against its goal. Intrusion detection is the action of detecting inapt, inexact, and abnormal activity in the network data. Network security is a major worry in large organization. Data integrity, secrecy, and ease of use must be conserved in order to make certain network security. In this paper, we consider the accuracy as the first issue and efficiency as the second issue using conditional random field and encrusted method. The proposed technique performs well than best-known methods such as naïve Bayes and Decision tree. The probe layer attacks stops network service. Remote to local (R2L), User to root (U2R) attacks and denial-of-service attacks (DOS) are widely known attacks that make impact on network assets. Improved attack detection efficiency can be obtained through CRF and high efficiency by implementing encrusted approach.


IDS Conditional random fields Encrusted approach 


  1. 1.
    W. Lee, S. Stolfo, A framework for constructing features and models for intrusion detection systems. ACM Trans. Inf. Syst. Secur. 3(4), 227–261 (2000)CrossRefGoogle Scholar
  2. 2.
    E. Eskin, A. Arnold, M. Prerau, L. Portnoy, S. Stolfo, A Geometric Framework For Unsupervised Anomaly Detection: Detecting Intrusions In Unlabeled Data. Applications of Data Mining in Computer Security (Kluwer, Dordrecht, 2002)Google Scholar
  3. 3.
    I.H. Witten, E. Frank, Data Mining-Practical Machine Learning Tools and Techniques (Morgan Kaufmann publishers, Burlington, 2005)MATHGoogle Scholar
  4. 4.
    J. Han, M. Kamber, J. Pei, Data Mining: Concepts and Techniques (Elsevier, Burlington, 2011)Google Scholar
  5. 5.
    M. M. Campos, B. L. Milenova, Creation and Deployment of Data Mining-Based Intrusion Detection Systems in Oracle Database 10g. Proceedings of the 4th International Conference on Machine Learning and Applications. (2005)Google Scholar
  6. 6.
    S. Vinila Jinny, J. Jaya Kumari, Neuralised Intrusion Detection System. Proceedings of IEEE Conference on Signal Processing, Communication, Computing and Networking Technologies. (2011)Google Scholar
  7. 7.
    Barbara,D., Jajodia,S.: Applications Of Data Mining In Computer Security. (2002)Google Scholar
  8. 8.
    D. Anderson, T. Frivold, A. Valdes, Next-Generation Intrusion Detection Expert System (NIDES)—A Summary. SRI International. (1995)Google Scholar
  9. 9.
    D. Barbara, J. Couto, S. Jajodia, L. Popyack, N. Wu, ADAM: Detecting Intrusions By Data Mining. Proceeding 2nd Annual IEEE Workshop Information Assurance Security. (2001), pp. 11–16Google Scholar
  10. 10.
    Hu Weihua, Qi Jing, Du Yuge, Cheng Li, Wang Zhao, Cheng Li, Agent-based Network Intrusion Detection Expert system. Int. Rev. Comput. Softw. 4, 1453–1457 (2012)Google Scholar
  11. 11.
    S. Vinila Jinny, J. Jaya Kumari, Comparative analysis of Intrusion Detection Systems with mining. Int. Rev. Comput. Softw. 8(10), 2541–2544 (2013)Google Scholar
  12. 12.
    A. Bivens, M. Embrechts, C. Palagiri, R. Smith, B. Szymanski, Network-Based Intrusion Detection Using Neural Networks. Proceedings of Artificial Neural Network Engineering. (2002), pp. 527–535Google Scholar
  13. 13.
    W. Lee, S. Stolfo, K. Mok, Adaptive intrusion detection: a data mining approach. Artif. Intell. Rev. 14, 533–567 (2000)CrossRefMATHGoogle Scholar
  14. 14.
    T. Abraham, IDDM: Intrusion Detection Using Data Mining Techniques. DSTO publications.(2008)Google Scholar
  15. 15.
    D. Forte, Log management for effective incident response. Netw. Secur. 2005(9), 4–7 (2005)CrossRefGoogle Scholar
  16. 16.
    B. Gupta, K. K. Nath, R. Kotagiri, Conditional Random Fields For Intrusion Detection. Proceeding 21st International Conference on Advanced Information Networking and Applications Workshop. (2007), pp. 203–208Google Scholar
  17. 17.
    W. Lee, S. Stolfo, M. Mok, A Data Mining Framework for Building Intrusion Detection Model. Proceedings of the IEEE Symposium on Security and Privacy. (1999), pp. 120–132Google Scholar

Copyright information

© Springer India 2015

Authors and Affiliations

  1. 1.Department of Computer Science and EngineeringNoorul Islam UniversityThuckalayIndia
  2. 2.Department of Electronics and Communication EngineeringNoorul Islam UniversityThuckalayIndia

Personalised recommendations