Skip to main content

Ensemble of Soft Computing Techniques for Inline Intrusion Detection System | Chapter 07 | Theory and Applications of Mathematical Science Vol. 1

An intrusion detection system automates the supervising activities in a computer network and computer system. It is used to analyses activities in network or computer. Basically, intrusion detection system is used to identify abuse or incomplete threats of abuse of computer security policies. It detects intruders, malicious actions, malicious code, and unwanted communications over the Internet. Despite the advancements and substantial research efforts, the general intrusion detection system gives high false positive rate, low classification accuracy and slow speed. For overcoming these limitations, many researchers are trying to design and implement intrusion detection systems that are easy to use and easy to install. There are many methods and techniques of intrusion detection system. Soft computing techniques are gradually being used for intrusion detection system. In this chapter, we present the ensemble approach of different soft computing techniques for designing and implementing inline intrusion detection system. In this work, three base classifiers are implemented using different artificial neural networks. Initially, Neuro-fuzzy neural network, Multilayer Perceptron and Radial Basis Function neural network have been constructed. These three networks have been combined using voting methods of machine learning. Three base classifiers are separately trained and evaluated in term of classification accuracy, false positive rate, false negative rate, sensitivity, specificity and precision. The voting combination ensemble method of machine learning has used to combine these three trained models. The performance ensemble classifier is evaluated and compared with the performances of base classifiers. In our study, we found that final ensemble classifier using Neuro-fuzzy, Multilayer Perceptron and Radial Basis Function neural network is superior to the individual base classifier in detection of intruder in network. The performance of ensemble classifier is measured in terms of classification accuracy and sensitivity. It is also found that ensemble based classifier for intrusion detection system has reasonable classification accuracy, the best sensitivity and false negative rate with very low false positive rate on test data set. The experimental results show that the base classifiers take very less time to build models and the proposed ensemble classifier for intrusion detection system takes very less time to test data set. These advantages can help to deploy the intrusion detection system to easily capture and detect online packets.

Author(s) Details

D. P. Gaikwad
Department of Computer Engineering, All India Shri Shivaji Memorial Society’s College of Engineering, Pune, India.

Dr. R. C. Thool
Department of Computer Engineering, All India Shri Shivaji Memorial Society’s College of Engineering, Pune, India.

View Books: http://bp.bookpi.org/index.php/bpi/catalog/book/117

Comments

Popular posts from this blog

Risk Factors for Postpartum Psychiatric Disorders. A Review of the Literature | Chapter 8 | New Visions in Medicine and Medical Science Vol. 4

  Objective: The aim of this study was to explore the risk factors for the development of postpartum psychiatric disorders through international literature. Materials and Methods: Throughout many articles in PubMed, Google scholar and PsycInfo, a great amount of recent data was gathered to identify the disorders that are most common as well as their risk factors. Results: After childbirth, most commonly women experience postpartum depression, anxiety disorders, post-traumatic stress disorder and postpartum psychosis. All the disorders have many similar risk-factors with the main one being preexisting psychiatric disorder and many similar symptoms too. Conclusions: Women after childbirth are at risk of experience many psychiatric disorders, such as postpartum distress, postpartum post traumatic stress disorder and even more rarely postpartum psychosis. It is important to provide comprehensive support to ensure the well-being of both the mother and the infant and this will b...

Greening Regional Airports: A Vision for Carbon Neutral Infrastructure | Chapter 12 | Contemporary Perspective on Science, Technology and Research Vol. 3

 This study provides an overview of the energy demand of a regional airport, divided into individual time horizons. The electrification of aircraft systems raises the question of whether airports will be among the largest electricity consumers in our infrastructure in the future. Sustainability and especially emission reductions are significant challenges for airports that are currently being addressed. The Clean Sky 2 project GENESIS addresses the environmental sustainability of hybrid-electric 50-passenger aircraft systems in a life cycle perspective to support the development of a technology roadmap for the transition to sustainable and competitive electric aircraft systems. This article originates from the GENESIS research and describes various options for ground power supply at a regional airport. Potential solutions for airport infrastructure with a short (2030), medium (2040), and long (2050) time horizon are proposed. In addition to the environmental and conservation benefi...

Alkali Element Modification of Glucose Molecules as a Method to Dissolve Cancer Cells | Chapter 12 | New Visions in Medicine and Medical Science Vol. 4

  The present study highlights about alkali element modification of glucose molecules as a method to dissolve cancer cells. The central regulation of the mechanisms governing cell proliferation has little effect on cancer cells. Cancer cells are entirely independent of the central command and divide and proliferate on their own, making it challenging to activate their response mechanism. Precisely, this is the reason why they are at risk to the health of humans and/or any biological entities. Instead of trying to reconnect the central command of the growth control mechanism to cancer cells that are already out of the range, we present a method of using the cancer cell’s own irresponsive and uncontrolled growth mechanism to their disadvantage and destroy the cancer cells. We found that this is achievable in an atomic/molecular level study of the glucose molecule, which is the primary food source used for growth and energy generation by all cells in the body, including the cancer cel...