Skip to main content

Ensemble of Soft Computing Techniques for Inline Intrusion Detection System | Chapter 07 | Theory and Applications of Mathematical Science Vol. 1

An intrusion detection system automates the supervising activities in a computer network and computer system. It is used to analyses activities in network or computer. Basically, intrusion detection system is used to identify abuse or incomplete threats of abuse of computer security policies. It detects intruders, malicious actions, malicious code, and unwanted communications over the Internet. Despite the advancements and substantial research efforts, the general intrusion detection system gives high false positive rate, low classification accuracy and slow speed. For overcoming these limitations, many researchers are trying to design and implement intrusion detection systems that are easy to use and easy to install. There are many methods and techniques of intrusion detection system. Soft computing techniques are gradually being used for intrusion detection system. In this chapter, we present the ensemble approach of different soft computing techniques for designing and implementing inline intrusion detection system. In this work, three base classifiers are implemented using different artificial neural networks. Initially, Neuro-fuzzy neural network, Multilayer Perceptron and Radial Basis Function neural network have been constructed. These three networks have been combined using voting methods of machine learning. Three base classifiers are separately trained and evaluated in term of classification accuracy, false positive rate, false negative rate, sensitivity, specificity and precision. The voting combination ensemble method of machine learning has used to combine these three trained models. The performance ensemble classifier is evaluated and compared with the performances of base classifiers. In our study, we found that final ensemble classifier using Neuro-fuzzy, Multilayer Perceptron and Radial Basis Function neural network is superior to the individual base classifier in detection of intruder in network. The performance of ensemble classifier is measured in terms of classification accuracy and sensitivity. It is also found that ensemble based classifier for intrusion detection system has reasonable classification accuracy, the best sensitivity and false negative rate with very low false positive rate on test data set. The experimental results show that the base classifiers take very less time to build models and the proposed ensemble classifier for intrusion detection system takes very less time to test data set. These advantages can help to deploy the intrusion detection system to easily capture and detect online packets.

Author(s) Details

D. P. Gaikwad
Department of Computer Engineering, All India Shri Shivaji Memorial Society’s College of Engineering, Pune, India.

Dr. R. C. Thool
Department of Computer Engineering, All India Shri Shivaji Memorial Society’s College of Engineering, Pune, India.

View Books: http://bp.bookpi.org/index.php/bpi/catalog/book/117

Comments

Post a Comment

Popular posts from this blog

Empowerment and Leader Member Exchange towards Organizational Citizenship Behavior Readiness among Government Workforce in Malaysia | Book Publisher International

  State agencies are among the most significant entities that represent the public's needs, and their programmes are essential to a state's and the nation's economic growth and development. State agencies have been rife by public concerns for years, as demonstrated by the Public Complaints Bureau, as problems of inefficiency in service quality and delivery have yet to meet the public's standards. With the support of 15 employees from state agencies on Malaysia's east coast, this study aims to achieve three targets. The first and second objectives are to investigate the ties between leader-member exchange (LMX) and OCB empowerment. The final aim is to define the most significant factors that affect OCB willingness. A total of 288 people took part in the survey, which was conducted using a cluster sampling process. The survey items had achieved the necessary reliability, according to the pilot test results, and some sub-dimensions were renamed after factor analysis.

The Utilization of Agro-Waste: A Nanobiotechnology Point of View | Chapter 10 | Recent Advances in Biological Research Vol. 5

Aims: To review the utilization of agro-waste in the eco-friendly synthesis of nanoparticles and their biomedical, catalytic and industrial applications. Study Design: A review. Place and Duration of Study: This review was carried out in the interim of three weeks exploiting all relevant data, literature and publications where necessary. Methodology: Profound gathering of literatures/publications and reviews were employed with all carefulness and professional courtesy; enough useful information were gathered over time. The introduction emphasizes the dawn of science and technology, when great ideas were still latent later leading to the advent of history changing innovations like the completion of human genome and then the birth of nanotechnology. Although, nanotechnology had been known decades been popularized by Richard Feynman in his talks in the year 1959; and in this present dispensation, nanotechnology has been a solution to many intricate challenges/ t

Re-asserting Cultural Perspectives: Old People and New Ideas in Bole Butake’s Lake God and The Survivors and Sankie Maimo’s Succession in Sarkov | Chapter 10 | Perspectives of Arts and Social Studies Vol. 2

African cultures have undergone transformations from the colonial period to the present, often to the detriment of its cultural evolution and within the larger global community. As it were, colonial education subordinated African communalism and created in its place an anti-African spirit evident in the assimilation of western values. This did not only end up in a kind of cultural betrayal, but also posed as a serious threat to the dignity and identity of the people. Those who fall prey to this kind of cultural imperialism are the young people who are often irrationally carried away by western fashion and modes that they tend to neglect and/or forget their cultural ways of life as they join the race of “progress.” This situation has given rise to a conscious effort by creative writers to re-assert and protect African values while at the same time liberating themselves from the longstanding western effort at suppressing, controlling and dominating their thoughts particularly through n