Skip to main content

A Novel Intrusion Detection System Based on Advanced Naive Bayesian Classification

  • Conference paper
  • First Online:
5G for Future Wireless Networks (5GWN 2017)

Abstract

Intrusion Detection System is a pattern recognition task whose aim is to detect and report the occurrence of abnormal or unknown network behaviors in a given network system being monitored. In this paper, we propose a machine learning model, advanced Naive Bayesian Classification (NBC-A) which is based on NBC and ReliefF algorithm, to be used in the novel IDS. We use ReliefF algorithm to give every attribute of network behavior in KDD’99 dataset a weight that reflects the relationship between attributes and final class for better classification results. The novel IDS has a higher True Positive (TP) rate and a lower False Positive (FP) rate in detection performance.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Rappaport, T.S., Sun, S., Mayzus, R., Zhao, H.: Millimeter wave mobile communications for 5G cellular: it will work! IEEE Access 1(1), 335–349 (2013)

    Article  Google Scholar 

  2. Boccardi, F., Heath, R.W., Lozano, A., Marzetta, T.L.: Five disruptive technology directions for 5G. IEEE Commun. Mag. 52(2), 74–80 (2013)

    Article  Google Scholar 

  3. Matsui, M.: The first experimental cryptanalysis of the data encryption standard. In: Desmedt, Y.G. (ed.) CRYPTO 1994. LNCS, vol. 839, pp. 1–11. Springer, Heidelberg (1994). https://doi.org/10.1007/3-540-48658-5_1

    Google Scholar 

  4. Biryukov, A., Cannière, C.D.: Data encryption standard (DES) (2005)

    Google Scholar 

  5. Lowe, G.: An attack on the Needham-Schroeder public-key authentication protocol. Inf. Process. Lett. 56(3), 131–133 (1995)

    Article  MATH  Google Scholar 

  6. Manner, J., Karagiannis, G., Mcdonald, A.: NSIS signaling layer protocol (NSLP) for quality-of-service signaling. IETF 31(2), 152–160 (2010)

    Google Scholar 

  7. Huang, M.Y., Jasper, R.J., Wicks, T.M.: A large scale distributed intrusion detection framework based on attack strategy analysis. Comput. Netw. 31(23–24), 2465–2475 (1998)

    Google Scholar 

  8. Bache, K., Lichman, M.: UCI Machine Learning Repository (2013)

    Google Scholar 

  9. Flach, P.A., Lachiche, N.: Naive Bayesian classification of structured data. Mach. Learn. 57(3), 233–269 (2004)

    Article  MATH  Google Scholar 

  10. Muirhead, D., Imran, M.A., Arshad, K.: Insights and approaches for low-complexity 5G small-cell base-station design for indoor dense networks. IEEE Access 3, 1562–1572 (2015)

    Article  Google Scholar 

  11. Deng, W., Wang, G., Wang, Y.: Weighted Naive Bayes classification algorithm based on rough set. Comput. Sci. 34(2), 204–205 (2007)

    Google Scholar 

  12. Cheng, K., Zhang, C.: Feature-based weighted Naive Bayesian classifier (2006)

    Google Scholar 

  13. Yao, S., Li, L.: Weighted Naïve Bayesian classification algorithm based on correlation coefficients. Int. J. Adv. Comput. Technol. 4(20), 29–35 (2012)

    Google Scholar 

  14. Robnikšikonja, M., Kononenko, I.: Theoretical and empirical analysis of ReliefF and RReliefF. Mach. Learn. 53(1), 23–69 (2003)

    Article  MATH  Google Scholar 

  15. Deng, Z., Chung, F.L., Wang, S.: Robust relief-feature weighting, margin maximization, and fuzzy optimization. IEEE Trans. Fuzzy Syst. 18(4), 726–744 (2010)

    Article  Google Scholar 

  16. Hamid, Y., Sugumaran, M., Journaux, L.: Machine learning techniques for intrusion detection: a comparative analysis. In: International Conference on Informatics and Analytics (2016)

    Google Scholar 

  17. Fei, Z., Guo, J., Wan, P., Yang, W.: Fast automatic image segmentation based on Bayesian decision-making theory. In: International Conference on Information and Automation (2009)

    Google Scholar 

  18. Zhang, C., Wang, J.: Attribute weighted Naive Bayesian classification algorithm. Microcomputer Information, pp. 27–30 (2010)

    Google Scholar 

  19. Han, J., Kamber, M., Pei, J.: Data Mining: Concepts and Techniques, 2nd edn. (The Morgan Kaufmann Series in Data Management Systems) (2006)

    Google Scholar 

  20. Pfahringer, B.: Winning the KDD99 classification cup: bagged boosting. ACM SIGKDD Explor. Newsl. 1(2), 65–66 (2000)

    Article  Google Scholar 

Download references

Acknowledgments

This research was supported by the National Key Research and Development Program of China (2016YFB0100902).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Daxin Tian .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Wang, Y. et al. (2018). A Novel Intrusion Detection System Based on Advanced Naive Bayesian Classification. In: Long, K., Leung, V., Zhang, H., Feng, Z., Li, Y., Zhang, Z. (eds) 5G for Future Wireless Networks. 5GWN 2017. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 211. Springer, Cham. https://doi.org/10.1007/978-3-319-72823-0_53

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-72823-0_53

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-72822-3

  • Online ISBN: 978-3-319-72823-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics