Skip to main content

Comparative Analysis of Classification Techniques in Network Based Intrusion Detection Systems

  • Conference paper
  • First Online:
Proceedings of the First International Conference on Intelligent Computing and Communication

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 458))

Abstract

An Intrusion Detection System (IDS) monitors the system events and examines the log files in order to detect the security problem. In this paper, we analyze the classification algorithms, especially Entropy based classification, Naïve classifier, and J48 using KDD-CUP’99 dataset to detect the different types of attacks. The KDD-Cup’99 dataset is a standard dataset for analysing these type of classification techniques. In KDD-CUP’99 dataset, each instance corresponds to either attack or normal connection. The KDD-Cup’99 dataset contains mainly four types of attack, namely, DOS, U2R, R2L, Probe and these four types of attacks also have subcategories attacks. In this paper, we carry out simulations on the KDD-Cup’99 dataset for all four types of attacks and their subcategories. The back, land, Neptune, pod, smurf, teardrop belong to DoS; the rootkit, Perl, loadmodule, buffer-overflow belong to U2R; the FTP-write, spy, phf, guess-passwd, imap, warezclient, warezmaster, multihop belong to R2L, and the Ipsweep, nmap, portsweep, satan belong to the probe. The simulation results show that the entropy based classification algorithm gives high detection rate and accuracy for normal instances over the J48 and Naïve Bayes classifiers.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Denning, Dorothy E.: An intrusion-detection model. Software Engineering, IEEE Transactions on 2, pp. 222–232. (1987)

    Google Scholar 

  2. Deepa, A. J., V. Kavitha.: A comprehensive survey on approaches to intrusion detection system. Procedia Engineering 38, pp. 2063–2069. (2012)

    Google Scholar 

  3. Mukherjee, Saurabh, Neelam Sharma.: Intrusion detection using naive Bayes classifier with feature reduction. Procedia Technology 4, pp. 119–128. (2012)

    Google Scholar 

  4. Arora, Rohit, Suman Suman.: Comparative analysis of classification algorithms on different datasets using WEKA. International Journal of Computer Applications 54.13, pp. 21–25, (2012)

    Google Scholar 

  5. Sunil Kumar Gautam, Hari Om.: Anomaly Detection System using Entropy based Technique. International Conference on Next Generation Computing Technologies, IEEE, (2015)

    Google Scholar 

  6. Liao, Hung-Jen, et al.: Intrusion detection system: A comprehensive review. Journal of Network and Computer Applications 36.1, pp. 16–24. (2013)

    Google Scholar 

  7. Bolon-Canedo et al.: Feature selection and classification in multiple class datasets: An application to KDD Cup 99 dataset. Expert Systems with Applications 38.5, pp. 5947–5957. (2011)

    Google Scholar 

  8. Guyon et al.: Eds. Feature extraction foundations and applications. Vol. 207. Springer, (2008)

    Google Scholar 

  9. Singh, Rajdeep et al.: Analysis of Feature Selection Techniques for Network Traffic Dataset. Machine Intelligence and Research Advancement (ICMIRA), 2013 International Conference on. IEEE, (2013)

    Google Scholar 

  10. Liu, Weili, Dexian Zhang.: Feature subset selection based on improved discrete particle swarm and support vector machine algorithm. Information Engineering and Computer Science, 2009. ICIECS 2009. International Conference on. IEEE, (2009)

    Google Scholar 

  11. Bu, Hualong, Shangzhi Zheng, Jing Xia.: Genetic algorithm based Semi-feature selection method. Bioinformatics, Systems Biology and Intelligent Computing, 2009. IJCBS’09. International Joint Conference on. IEEE, (2009)

    Google Scholar 

  12. Hall M.A.: Correlation-based feature subset selection for machine learning. Doctorate dissertation, Department of Computer Science, University of Waikato, Hamilton, New Zealand, (1999)

    Google Scholar 

  13. Kumar Ajay, Zhang David.: Personal Recognition Using Hand Shape and Texture. IEEE Transaction on Image Processing, Vol. 15, No. 8, pp. 2454–2461, (2006)

    Google Scholar 

  14. Liu, Huan, Rudy Setiono.: Chi2: Feature selection and discretization of numeric attributes. Tai. IEEE, (1995)

    Google Scholar 

  15. Cantú-Paz Erick, Newsam Shawn, Kamath Chandrika.: Feature selection in scientific applications. 10th ACM SIGKDD international conference on Knowledge discovery and data mining, Seattle, WA, USA, pp. 788–793, (2004)

    Google Scholar 

  16. Zexuan Zhu.: Wrapper–Filter Feature Selection Algorithm Using a Memetic Framework, IEEE Transactions on Systems, Man, and Cybernetics—Part b: Cybernetics, Vol. 37, No. 1, pp. 70–76,(2007)

    Google Scholar 

  17. Handl Julia, Knowles Joshua.: Feature Subset Selection in Unsupervised Learning via Multi objective Optimization. International Journal of Computational Intelligence Research, Vol. 2, No. 3, pp. 217–238, (2006)

    Google Scholar 

  18. Chandolikar, Mrs NS, V. D. Nandavadekar.: Efficient algorithm for intrusion attack classification by analyzing KDD Cup 99. Wireless and Optical Communications Networks (WOCN). 2012 Ninth International Conference on. IEEE, (2012)

    Google Scholar 

  19. Kaur, Gaganjot, and Amit Chhabra.: Improved J48 Classification Algorithm for the Prediction of Diabetes. International Journal of Computer Applications 98.22 (2014)

    Google Scholar 

  20. Gupta, D. L., A. K. Malviya, Satyendra Singh.: Performance analysis of classification tree learning algorithms. IJCA) International Journal of Computer Applications 55.6 (2012)

    Google Scholar 

  21. Hsu, Chung-Chian, Yan-Ping Huang, Keng-Wei Chang.: “Extended Naive Bayes classifier for mixed data.” Expert Systems with Applications 35.3, pp. 1080–1083, (2008)

    Google Scholar 

  22. Farid, Dewan Md, et al.: “Hybrid decision tree and naive Bayes classifiers for multi-class classification tasks.” Expert Systems with Applications 41.4, pp. 1937–1946, (2014)

    Google Scholar 

  23. Chandra, B., Manish Gupta.: Robust approach for estimating probabilities in Naïve–Bayes Classifier for gene expression data. Expert Systems with Applications 38.3, pp. 1293–1298, (2011)

    Google Scholar 

  24. Baron, Grzegorz.: “Influence of Data Discretization on Efficiency of Bayesian Classifier for Authorship Attribution.” Procedia Computer Science 35, pp. 1112–1121, (2011)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sunil Kumar Gautam .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer Science+Business Media Singapore

About this paper

Cite this paper

Gautam, S.K., Hari Om (2017). Comparative Analysis of Classification Techniques in Network Based Intrusion Detection Systems. In: Mandal, J., Satapathy, S., Sanyal, M., Bhateja, V. (eds) Proceedings of the First International Conference on Intelligent Computing and Communication. Advances in Intelligent Systems and Computing, vol 458. Springer, Singapore. https://doi.org/10.1007/978-981-10-2035-3_60

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-2035-3_60

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-2034-6

  • Online ISBN: 978-981-10-2035-3

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics