Intrusion Detection System using the Hybrid Model of Classification Algorithm and Rule-Based Algorithm
Main Article Content
Abstract
Intrusion detection system ID is necessary to secure the system from various intrusions. Analysis of the communication to categorize the data as useful or malicious data is crucial. The cyber security employed using intrusion detection systems should not also cause the extra time to perform the categorization. Nowadays machine learning techniques are used to make the identification of malicious data or an intrusion with the help of classification algorithms. The data set used for experimenting is KDD cup 99. The effect of individual classification algorithms can be improvised with the help of hybrid classification models. This model combines classification algorithms with rule-based algorithms. The blend of classification using machine and human intelligence adds an extra layer of security. An algorithm is validated using precision, recall, F-Measure, and Mean age Precision.
The accuracy of the algorithm is 92.35 percent. The accuracy of the model is satisfactory even after the results are acquired by combining our rules inwritten by humans with conventional machine learning classification algorithms. Still, there is scope for improving and accurately classifying the attack precisely.
Article Details
References
A. A. Rao, P. Srinivas, B. Chakravarthy, K. Marx, and P. Kiran, “A Java Based Network Intrusion Detection System ( IDS ),” Proc. 2006 IJME - INTERTECH Conf., pp. 1–8, 2006.
E. Anthi, L. Williams, M. Rhode, P. Burnap, and A. Wedgbury, “Adversarial attacks on machine learning cybersecurity defences in Industrial Control Systems,” J. Inf. Secur. Appl., vol. 58, no. February, p. 102717, 2021, doi: 10.1016/j.jisa.2020.102717.
S. R. Snapp, S. E. Smaha, D. M. Teal, and T. Grance, “The DIDS (Distributed Intrusion Detection System) Prototype,” Proc. Summer USENIX Conf., pp. 227–233, 1992, [Online]. Available: https://www.usenix.org/legacy/publications/library/proceedings/sa92/snapp.pdf
B. Garg, “Scheme of Neural Network for Time Series Analysis,” no. October 2008, 2015.
B. Garg and R. Garg, “Enhanced accuracy of fuzzy time series model using ordered weighted aggregation,” Appl. Soft Comput. J., vol. 48, no. January 2016, pp. 265–280, 2016, doi: 10.1016/j.asoc.2016.07.002.
C. Clark, W. Lee, D. Schimmel, D. Contis, M. Koné, and A. Thomas, “A Hardware Platform for Network Intrusion Detection and Prevention,” Netw. Process. Des., pp. 99–118, 2005, doi: 10.1016/B978-012088476-6/50007-1.
D. K, “Anomaly based Network Intrusion Detection System Dinakara K Anomaly based,” Engineering, 2008.
Mike Peeters, “Designing and Deploying Intrusion Detection Systems,” Cisco, 2003, [Online]. Available: https://www.cisco.com/c/dam/global/fr_ca/training-events/pdfs/Designing_and_Deploying_ids_technologies.pdf
library of congress cataloging-in-publication Data, Intrusion Detection Systems with Snort Advanced IDS Techniques Using Snort , Apache , MySQL , PHP , and ACID B RUCE P ERENS ’ O PEN S OURCE S ERIES. 2003.
S. Axelsson, “Paper.IDS - A Survey and Taxonomy,” pp. 1–27, 2000, [Online]. Available: papers3://publication/uuid/89f1c9ad-ad04-4684-a05e-f94f128ce4fc
B. Garg, “Optimizing Number of Inputs to Classify Breast Cancer Using Artificial Neural Network,” J. Comput. Sci. Syst. Biol., vol. 02, no. 04, 2009, doi: 10.4172/jcsb.1000037.
B. S. Kumar, T. C. S. P. Raju, M.Ratnakar, S. D. Baba, and N.Sudhakar, “Intrusion Detection System- Types and Prevention,” Int. J. Comput. Sci. Inf. Technol., vol. 4, no. 1, pp. 77–82, 2013.
G. Liu, H. Zhao, F. Fan, G. Liu, Q. Xu, and S. Nazir, “An Enhanced Intrusion Detection Model Based on Improved kNN in WSNs,” Sensors, vol. 22, no. 4, pp. 1–18, 2022, doi: 10.3390/s22041407.
S. Ullah et al., “HDL-IDS: A Hybrid Deep Learning Architecture for Intrusion Detection in the Internet of Vehicles,” Sensors, vol. 22, no. 4, pp. 1–20, 2022, doi: 10.3390/s22041340.
F. Alrowais et al., “Intelligent Intrusion Detection Using Arithmetic Optimization Enabled Density Based Clustering with Deep Learning,” Electronics, vol. 11, no. 21, p. 3541, Oct. 2022, doi: 10.3390/electronics11213541.
M. A. Khan et al., “A deep learning-based intrusion detection system for mqtt enabled iot,” Sensors, vol. 21, no. 21, pp. 1–25, 2021, doi: 10.3390/s21217016.
K. Kotecha et al., “Enhanced network intrusion detection system,” Sensors, vol. 21, no. 23, pp. 1–15, 2021, doi: 10.3390/s21237835.
K. K. Beldar, M. D. Gayakwad, D. Bhattacharyya, and T. H. Kim, “A comparative analysis on contingence structured data methodologies,” Int. J. Softw. Eng. its Appl., 2016, doi: 10.14257/ijseia.2016.10.5.03.
M. A. Boukhari and M. D. Gayakwad, “An experimental technique on fake news detection in online social media,” Int. J. Innov. Technol. Explor. Eng., vol. 8, no. 8 Special Issue 3, 2019.
J. McHugh, “Intrusion and intrusion detection,” Int. J. Inf. Secur., vol. 1, no. 1, pp. 14–35, 2001, doi: 10.1007/s102070100001.
A. Kadam and B. Garg, “Accuracy and Deviation Analysis of Intrusion Detection System,” SSRN Electron. J., 2022, doi: 10.2139/ssrn.4025358.
G. Smith, “Public Sector Open Innovation: Exploring Barriers and How Intermediaries Can Mitigate Them,” Thesis, no. September, 2018.
M. S. O’Hern and L. R. Kahle, “The Empowered Customer: User-Generated Content and the Future of Marketing,” Glob. Econ. Manag. Rev., vol. 18, no. 1, pp. 22–30, 2013, doi: 10.1016/s2340-1540(13)70004-5.
M. Mayrhofer, J. Matthes, S. Einwiller, and B. Naderer, “User generated content presenting brands on social media increases young adults’ purchase intention,” Int. J. Advert., vol. 39, no. 1, pp. 166–186, 2020, doi: 10.1080/02650487.2019.1596447.
Beldar, Kavita K., M. D. Gayakwad, and M. K. Beldar. 2016. “Optimizing Analytical Queries on Probabilistic Databases with Unmerged Duplicates Using MapReduce.” Int. J. Innov. Res. Comput. Commun. Eng 4: 9651–59.
Beldar, Kavita K., M. D. Gayakwad, Debnath Bhattacharyya, and Hye-Jin Kim. 2016a. “Query Evaluation on Probabilistic Databases Using Indexing and MapReduce.” International Journal of Database Theory and Application 9 (10): 363–78.
Beldar, Kavita K., M. D. Gayakwad, Debnath Bhattacharyya, and Tai-Hoon Kim. 2016b. “A Comparative Analysis on Contingence Structured Data Methodologies.” International Journal of Software Engineering and Its Applications 10 (5): 13–22.
Beldar, Miss Menka K., M. D. Gayakwad, and Miss Kavita K. Beldar. 2018. “Altruistic Content Voting System Using Crowdsourcing.” International Journal of Scientific Research and Review 7 (5): 477–86.
Beldar, Miss Menka K., M. D. Gayakwad, Miss Kavita K. Beldar, and M. K. Beldar. 2018. “Survey on Classification of Online Reviews Based on Social Networking.” IJFRCSCE 4 (3): 55.
Boukhari, Mahamat Adam, Prof Milnid Gayakwad, and Prof Dr Suhas Patil. 2019. “Survey on Inappropriate Content Detection in Online Social Media.” International Journal of Innovative Research in Science, Engineering and Technology 8 (9): 9297–9302.
Gayakwad, M. D., and B. D. Phulpagar. 2013. “Research Article Review on Various Searching Methodologies and Comparative Analysis for Re-Ranking the Searched Results.” International Journal of Recent Scientific Research 4: 1817–20.
Gayakwad, Milind. 2011. “VLAN Implementation Using Ip over ATM.” Journal of Engineering Research and Studies 2 (4): 186–92.
Gayakwad, Milind, and Suhas Patil. 2020. “Content Modelling for Unbiased Information Analysis.” Libr. Philos. Pract, 1–17.
Gayakwad, Milind, Suhas Patil. “Analysis of Methodologies to Model the Content for Conveying the Correct Information.” In 2021 International Conference on Computing, Communication and Green Engineering (CCGE), 1–4. IEEE.
Gayakwad, Milind, Suhas Patil .“Assessment of Source, Medium, and Intercommunication for Assessing the Credibility of Content.” In 2021 International Conference on Smart Generation Computing, Communication and Networking (SMART GENCON), 1–5. IEEE.
Gayakwad, Milind, Suhas Patil, Rahul Joshi, Sudhanshu Gonge, and Sandeep Dwarkanath Pande. “Credibility Evaluation of User-Generated Content Using Novel Multinomial Classification Technique.” International Journal on Recent and Innovation Trends in Computing and Communication 10 (2s): 151–57.
Gayakwad, Milind, Suhas Patil, Amol Kadam, Shashank Joshi, Ketan Kotecha, Rahul Joshi, Sharnil Pandya, et al. 2022. “Credibility Analysis of User-Designed Content Using Machine Learning Techniques.” Applied System Innovation 5 (2): 43.
Harane, Swati T., Gajanan Bhole, and Milind Gayakwad. 2017. “SECURE SEARCH OVER ENCRYPTED DATA TECHNIQUES: SURVEY.” International Journal of Advanced Research in Computer Science 8 (7).
Kavita Shevale, Gajanan Bhole, Milind Gayakwad. 2017. “Literature Review on Probabilistic Threshold Query on Uncertain Data.” International Journal of Current Research and Review 9 (6): 52482–84.
Mahamat Adam Boukhari, Milind Gayakwad. 2019. “An Experimental Technique on Fake News Detection in Online Social Media.” International Journal of Innovative Technology and Exploring Engineering (IJITEE) 8 (8S3): 526–30.
Maurya, Maruti, and Milind Gayakwad. 2020. “People, Technologies, and Organizations Interactions in a Social Commerce Era.” In Proceeding of the International Conference on Computer Networks, Big Data and IoT (ICCBI-2018), 836–49. Springer International Publishing.
Milind Gayakwad, B. D. Phulpagar. 2013. “Requirement Specific Search.” IJARCSSE 3 (11): 121.
Panicker, Aishwarya, Milind Gayakwad, Sandeep Vanjale, Pramod Jadhav, Prakash Devale, and Suhas Patil. n.d. “Fake News Detection Using Machine Learning Framework.”
Sharma, Jitin, Prashant C. Chavan, T. B. Patil, Supriya C. Sawant, and Milind Gaykawad. 2022. “A Comparative Analysis of Brain Tumor Classification and Prediction Techniques by Applying MRI Images Encompassing SVM and CNN with Transfer Learning Method.” Journal of Algebraic Statistics 13 (3): 393–405.
Alagarsamy, M. ., Shanmugam, N. ., Paramathi Mani, D. ., Thayumanavan, M. ., Sundari, K. K. ., & Suriyan, K. . (2023). Detection of Polycystic Syndrome in Ovary Using Machine Learning Algorithm. International Journal of Intelligent Systems and Applications in Engineering, 11(1), 246–253. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/2464
Shevale, Kavita, Gajanan Bhole, and Milind Gayakwad. 2017. “Probabilistic Threshold Query on Uncertain Data Using SVM.” Int. J. Adv. Res. Comput. Sci 8: 1967–69.
Singh, Mahendra Kumar, Amol K. Kadam, Milind Gayakwad, Pramod Jadhav, Vinayak N. Patil, Prasad Kadam, Vinod Patil, and Sunita Dhotre. n.d. “An empirical approach for underwater image quality enhancement and object detection using deep learning.” https://www.researchgate.net/profile/Amol-Kadam-3/publication/363210290_An_Impirical_Approach_for_Underwater_Image_Quality_Enhancement_and_Object_Detection_using_Deep_Learning_An_Impirical_Approach_for_Underwater_Image_Quality_Enhancement_and_Object_Detection_using_Deep_L/links/6311901cacd814437ff7a165/An-Impirical-Approach-for-Underwater-Image-Quality-Enhancement-and-Object-Detection-using-Deep-Learning-An-Impirical-Approach-for-Underwater-Image-Quality-Enhancement-and-Object-Detection-using-Deep-L.pdf.