Skip to main content

DOMAIN-Based Intelligent Network Intrusion Detection System

  • Conference paper
  • First Online:
Inventive Computation and Information Technologies

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 336))

Abstract

The state-of-the-art presently in the network intrusion detection, both in the network-level intrusion detection system and the host-level intrusion detection system, is completely based on the black box model which learns the pattern from knowledge database or from the dataset to the model. Proposed model is to combine the machine learning-based IDS approach and the domain knowledge incorporating method to build efficient and intelligent IDS which can be employed to detect typical intrusion and future intrusion which is not known. The idea behind is to make some data assimilation process in the features of the dataset such that a reduced and a meaningful feature set representation can be fed in to the model so as to construct intelligent generalized model which will be capable of handling unforeseen attack and new different kind of large data within in limited time period. May be with some compromise in the accuracy of the model but with increased generalizability.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 189.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 249.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. https://ieeexplore.ieee.org/abstract/document/8621955/

  2. https://www.analyticsvidhya.com/blog/2017/09/common-machine-learning-algorithms/

  3. R. Vinayakumar et al., Deep learning approach for intelligent intrusion detection system. IEEE Access 7, 41525–41550 (2019)

    Article  Google Scholar 

  4. N. Muralidhar, et al., Incorporating prior domain knowledge into deep neural networks, in 2018 IEEE International Conference on Big Data (Big Data) (IEEE, 2018)

    Google Scholar 

  5. A. Javaid, et al.,A deep learning approach for network intrusion detection system, in Proceedings of the 9th EAI International Conference on Bio-inspired Information and Communications Technologies (formerly BIONETICS) (2016)

    Google Scholar 

  6. W. Li, Using genetic algorithm for network intrusion detection. Proc. United States Dept. Energy Cyber Secur. Group 1, 1–8 (2004)

    Google Scholar 

  7. S.C.-H. Yang, P. Shafto, Explainable artificial intelligence via bayesian teaching, in NIPS 2017 Workshop on Teaching Machines, Robots, and Humans, 2017

    Google Scholar 

  8. Q. Niyaz, W. Sun, A.Y. Javaid, A Deep Learning Based DDoS Detection System in Software-Defined Networking (SDN). arXiv:1611.07400 (2016)

  9. P. Wu, H. Guo, R. Buckland, A transfer learning approach for network intrusion detection, in 2019 IEEE 4th International Conference on Big Data Analytics (ICBDA) (IEEE, 2019)

    Google Scholar 

  10. J. Zhang, M. Zulkernine, A. Haque, Random-forests-based network intrusion detection systems. IEEE Trans. Syst. Man Cybern. C Appl. Rev. 38(5), 649–659 (2008)

    Google Scholar 

  11. N. Harini, D. Kamakshi, D. Aruna, Secure proxy blind ECDS algorithm for IoT. Int. J. Pure Appl. Math. 118(7), 437–445 (2018)

    Google Scholar 

  12. J. Govindarajan, G. Kousalya, Cooperative flow regulation protocol for real-time and non- real-time applications over satellite network. J. Ambient Intell. Human. Comput. 12, 979–990 (2021); Z. Zhu, Y.-S. Ong, M. Dash, Wrapper-filter feature selection algorithm using a memetic framework. IEEE Trans. Syst. Man Cybern. Part B (Cybern.) 37(1), 70–76 (2007)

    Google Scholar 

  13. J. Govindarajan, G. Anusuya Devi, G. Kousalya, Analysis of TCP-unfairness from MAC layer perspective in wireless ad-hoc networks. Indian J. Sci. Technol. 8(19) (2015)

    Google Scholar 

  14. A. Daweri, M. Salam, K.A.Z. Ariffin, S. Abdullah, An Analysis of the KDD99 and UNSW-NB15 datasets for the intrusion detection system. Symmetry 12(10), 1666 (2020)

    Google Scholar 

  15. M. Sarnovsky, J. Paralic, Hierarchical intrusion detection using machine learning and knowledge model. Symmetry 12(2), 203 (2020)

    Article  Google Scholar 

  16. https://www.researchgate.net/publication/335639462_Machine_learning_approach_for_information_security

  17. https://drive.google.com/file/d/1P99M-7whaFzeNvkFd2jaD1jaqUVpUakc/view?usp=sharing

  18. https://www.deepwatch.com/blog/cia-in-cybersecurity/

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to J. Govindarajan .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Jose, N., Govindarajan, J. (2022). DOMAIN-Based Intelligent Network Intrusion Detection System. In: Smys, S., Balas, V.E., Palanisamy, R. (eds) Inventive Computation and Information Technologies. Lecture Notes in Networks and Systems, vol 336. Springer, Singapore. https://doi.org/10.1007/978-981-16-6723-7_34

Download citation

  • DOI: https://doi.org/10.1007/978-981-16-6723-7_34

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-16-6722-0

  • Online ISBN: 978-981-16-6723-7

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics