SlideShare una empresa de Scribd logo
1 de 4
Descargar para leer sin conexión
Multi-Classification Approach for Detecting
Network Attacks.
A.Kumaravel , Professor and Dean, M.Niraisha,PG Student, Department of Computer Science and Engineering.
Bharath University, Selaiyur, Chennai-600073, India
drkumaravel@gmail.com , naga_sharaini@yahoo.co.in
Abstract
Intrusion Detection System (IDS) has
increasingly become a crucial issue for computer and
network systems. Intrusion poses a serious security risk
in a network environment. The ever growing new
intrusion types pose a serious problem for their
detection. The acceptability and usability of Intrusion
Detection Systems get seriously affected with the data in
network traffic. A large number of false alarms mean a
lot in terms of the acceptability of Intrusion Detection
Systems[1].In this paper we consider the dataset with
multi classes and propose the classification for each type
of attacks in a separate layer. In this work, a multi-
classification approach for detecting network attacks is
designed and developed to achieve high efficiency and
improve the detection and classification rate accuracy
[6].
Keywords:Network Security, DataMining, Intrusion
detection system,Classification,Layered approach.
1. INTRODUCTION
An Intrusion Detection System (IDS)
provides an additional layer of security to network's
perimeter defense, which is usually, implemented
using a firewall. The goal of IDS is to collect
information from a variety of systems and network
sources, and then analyze the information for signs of
intrusion and misuse. IDSs are implemented in
hardware, software, or a combination of both.
On theother hand, our computers are under
attacks and vulnerable to many threats. There is
anincreasing availability of tools and tricks for
attacking and intruding networks. An intrusion canbe
defined as any set of actions that threaten the security
requirements (e.g., integrity,confidentiality,
availability) of computer/network resource (e.g., user
accounts, file systems,and system kernels). Intruders
have promoted themselves and invented innovative
toolsthat support various types of network attacks.
Hence, effective methods for intrusion detection (ID)
have become an insisting need to protect our
computers from intruders. In general, thereare two
types of Intrusion Detection Systems (IDS); misuse
detection systems and anomalydetection systems.
The problem of designing IDSs to work
effectively and yield higher accuracies for minor
attacks even in the mix of data has been receiving
serious attention in recent times. The imbalance in
data degrades the prediction accuracy. In most of the
available literature this is overcome by resampling
the training distribution. The resampling is done
either by oversampling of the minority class or by
under sampling of the majority class.
Classification is perhaps the most familiar
and most popular data mining technique.Prediction
can be thought of as classifying an attribute value
into one of a set of possible classes.
The subject is introduced briefly as
following, Insection 2, formulates the problem.
Insection 3, theexperimental results and analysis. We
present the conclusion in section 4.
2. PROBLEM STATEMENT
Our system is a modular network-based
intrusion detection system that analyzes TCP dump
data using data mining techniques to classify the
network records to not only normal and attack but
also identify attack type. The proposed system
consists of two stages. First stage is for attack
detection and the second stage is for attack
classification in multi-layer [1]. The data is input in
the first Stage.
2.1The Proposed Layered-Model Intrusion Detection
System
The main characteristics of our system:
First, our system has the capability of
classifying network intruders into two stages[2]. The
first stage classifies the network records to either
normal or attack. The second stage consists of four
sequential Layers which can identify four
categories/classes and their attack type. The data is
input in the first stage which identifies if this record
is a normal record or attack. If the record is identified
as an attack then the module would raise a flag to the
administrator that the coming record is an attack then
the module inputs this record to the second stage
which consists of four sequential Layers, one for each
class type (R2L,U2R,Dos,Probe)[3]. Each Layer is
responsible for identifying the attack type of coming
record according to its class type.
Proceedings of 2013 IEEE Conference on Information and Communication Technologies (ICT 2013)
978-1-4673-5758-6/13/$31.00 © 2013 IEEE 1114
Fig.1 Layered-Model Approach System
Else the attack passes through the next
Second, it takes less training
decrease in each layer where we u
dataset for training stage 1 then instage
the attacks for training excluding the n
Then each layer act as a filters that
attacks of each layer category which
need of further processing at subsequ
we took in consideration the propagati
to simulate the real system and res
accurate and real .
In many situations, there i
between efficiency and accuracy of th
there can be various avenues to im
performance. We implement the Laye
to improve overall system performance
intrusion detection model using JRip
high efficiency and improves the
classification with high rate of accuracy
3. EXPERIMENTAL ANALYSIS AND
In this section, first we
dataset.Apply the dataset in Wekatoo
Classification results.The datasets
experiments are from NSL-KDD [6] n
IDSs. Although, the proposed data s
from some of the problems and may n
representative of existing real network
the lack of public data sets for networ
but still it can be applied as an effecti
data set to help researchers comp
intrusion detection methods.
3.1 Dataset
3.1.1 DatasetDescription
Network based IDSs of nsl.cs
was about four gigabytes of compresse
dump data from seven weeks of netwo
was processed into about five millio
layer.
time and even
use the whole
e 2 we use only
normal records.
t classifies the
h eliminate the
uent layers but
on of errors as
sults be more
is a trade-off
he system and
mprove system
ered Approach
e as our layered
pRule achieves
detection and
y.
RESULTS
e collect the
ol [5] to find
s for these
network based
et still suffers
not be a perfect
ks, because of
rk-based IDSs,
ive benchmark
pare different
s.The raw data
ed binary TCP
rk traffic. This
on connection
records. Similarly, the two weeks
around two million connection re
is a sequence of TCP packets sta
some well-defined times, betwee
to and from a source IP address t
under some well-defined protocol
labeled as either normal, or as an
one specific attack type. Each
consists of about 100 bytes. Actu
in dataset.7000 instances that train
Attacks fall into four main catego
• DOS: denial-o
flood;
• R2L: unauthor
remote machi
password;
• U2R: unauthor
superuser (roo
various ``buffer
• Probing: surve
probing, e.g., po
3.1.2 AttributeDescription
Duration length (numb
the connectio
protocol type type of the p
udp, etc.
Service network serv
destination,
src_bytes number of da
source to des
dst_bytes number of da
destination t
Land 1 if connecti
same host/po
wrong_fragment number of ``
Urgent number of ur
srv_count number of co
same service
connection in
seconds
srv_serror_rate % of connec
``SYN'' error
srv_rerror_rate % of connec
``REJ'' error
srv_diff_host_rate % of connec
hosts
3.2 Performance evaluation
During the analysis of in
observe two mainchallenging iss
First, the number of intrusions
typically a very small fraction
Therefore the essential step is to
s of test data yielded
ecords. A connection
arting and ending at
en which data flows
to a target IP address
l. Each connection is
n attack, with exactly
h connection record
ually 42 attributes are
ning dataset.
ories:
of-service, e.g. syn
rized access from a
ine, e.g. guessing
rized access to local
ot) privileges, e.g.,
r overflow'' attacks;
eillance and other
ort scanning.
ber of seconds) of
on
protocol, e.g. tcp,
vice on the
e.g., http, telnet,etc.
ata bytes from
stination
ata bytes from
o source
ion is from/to the
ort; 0 otherwise
`wrong'' fragments
rgent packets
onnections to the
e as the current
n the past two
ctions that have
rs
ctions that have
s
ctions to different
ntrusion detection we
sues in this system.
son the network is
of the totaltraffic.
o select attributes of
Proceedings of 2013 IEEE Conference on Information and Communication Technologies (ICT 2013)
978-1-4673-5758-6/13/$31.00 © 2013 IEEE 1115
the various Layers. Second, the attacks are classified
in their impact and hence, it becomes necessary to
treat them differently.
To improve the minority attack detection
rate, while maintaining the overall detection rate. We
proposed a layered modelwith various classifiers
(BayesNet, NavieBayes,DecisionStump and
rulesJrip) on values. In layered model we definefour
layers that correspond to the four attack groups i.e.
DoSlayerfor detecting DoS attacks, Probe layer for
detecting Probe attacks,R2L layer for detecting R2L
attacks and U2R for U2R attacks.
3.2.1 Attribute Selection
Attribute selection usingweka tool. Table 1
shows the weight calculation of the selected attributes
depends on its impact.
TABLE 1:
Selected Attributes
Layer.
No
Layer
No. of
attributes
selected
Selected attributes
1
R2L
Layer
9 1,5,10,11,22,27,31,33,36
2
U2R
Layer
8 1,6,13,14,16,17,23,34
3
Dos
Layer
7 5,6,10,19,31,37,41
4
Probe
Layer
5 5,6,34,36,37
3.2.2 Classification with Stages
3.2.2.1 First Stage Results
Stage 1 is to classify whether coming record
is normal or attack. It is observed that JRip has a
significant detection rate for known and unknown
attacks compared to BN, DS and NB.The results of
Stage 1 are shown in table 2.
TABLE 2:
First stage classification
Method
correctly
classified
IN
correctly
classified
bayes.BayesNet 98.73% 1.26%
bayes.NaiveBayes 92.41% 7.58%
rules.Jrip 99.89% 0.10%
trees.DecisionStump
94.65% 5.34%
3.2.2.2 Second Stage Results
Records classified as attacks by the first
Stage are introduced to second Stage which is
responsible for classifying coming attack to one of
the four classes (DOS, Probe, U2R and R2L) and
identifying its attack type. Stage 2 consists of four
sequential layers; a layer for each class which
identify the class of each coming attack.
DoS Layer:
The results of Stage 2 DoS Layer are shown
in table 3.
TABLE 3:
Classification of DoS Layer
Method
correctly
classified
IN
correctly
classified
bayes.BayesNet 99.79% 0.21%
bayes.NaiveBayes 96.03% 3.97%
rules.Jrip 99.98% 0.02%
trees.DecisionStump 94.01% 5.99%
Probe Layer:
The results of Stage 2 Probe Layer are
shown in table 4.
TABLE 4:
Classification of Probe Layer
Method
correctly
classified
IN
correctly
classified
bayes.BayesNet 99.17% 0.83%
bayes.NaiveBayes 97.93% 2.07%
rules.Jrip 99.79% 0.21%
trees.DecisionStump 98.34% 1.66%
R2L Layer:
The results of Stage 2 R2L Layer are shown
in table 5.
TABLE 5:
Classification of R2L Layer
Method
correctly
classified
IN
correctly
classified
bayes.BayesNet 95.22% 4.78%
bayes.NaiveBayes 94.99% 5.01%
rules.Jrip 99.77% 0.23%
trees.DecisionStump 95.67% 4.33%
U2R Layer:
The results of Stage 2 U2R Layer are shown
in table 6.
Proceedings of 2013 IEEE Conference on Information and Communication Technologies (ICT 2013)
978-1-4673-5758-6/13/$31.00 © 2013 IEEE 1116
TABLE 6:
Classification of U2R Layer
Method
correctly
classified
IN
correctly
classified
bayes.BayesNet 99.54% 0.46%
bayes.NaiveBayes 97.68% 2.32%
rules.Jrip 99.98% 0.02%
trees.DecisionStump 99.77% 0.23%
We compare this non-layered approach with
the layered approach. We observe that the layered
approach with featureselection is more efficient and
more accurate in detecting attacks.
4. PERFORMANCE COMPARISON WITH EXISTING
APPROACHES
In this section, we compare the performance
of our approach with other works in this field. This
information is shown in Table 7.
TABLE 7:
Performance comparison with existing system.
Existing
Paper
DoS Probe R2L U2R
[2] 93.9% 98.2% 96.4% 65.4%
[3] 96.8% 99.0% 99.9% 73.2%
[4] 97.99% 97.23% 98.52% 99.49%
Our
Approach
99.98% 99.79% 99.77% 99.98%
GRAPH.1 Performance comparison with existing system.
According to the above table, proposed
system has good performance that is competitive with
other approaches based on classification accuracy
which is shown in graph.1
5. CONCLUSIONS
A multi-Layer intrusion detection system
has been developed to achieve high efficiency and
improve detection and classification accuracy. The
proposed system consists of two stages. First stage is
for attack detection and the second stage is for attack
classification. The data is input in the first Stage
which identifies if this record is a normal record or
attack. Experimental results indicate that the
proposed layered model with JRip classifier can
result in better prediction of minority classes without
hurting the prediction performance of the majority
class. It gives result for DoS Layer- 99.98%, Probe
Layer- 99.79%, R2L- 99.77%, U2R- 99.98%.
ACKNOWLEDGEMENTS
The authors would like to thank the
management of Bharath University for the support
and encouragement for this research work.
REFERENCES
[1] OludeleAwodele, Sunday Idowu,
OmotolaAnjorin, andVincent J. Joshua, “A
Multi-Layered Approach to the Design of
Intelligent Intrusion Detection and
Prevention System(IIDPS),” Issues in
Informing Science and
InformationTechnology Volume 6, 2009.
[2] Neelam Sharma, Saurabh Mukherjee,
“Layered Approach for Intrusion Detection
Using NaïveBayes Classifier,” ICACCI’12,
August 3-5, 2012, Chennai, T Nadu, India.
[3] P. GiftyJeya, M.Ravichandran, C.S.
Ravichandran, “Efficient Classifier for R2L
and U2R Attacks,” International Journal of
Computer Applications (0975 –
8887)Volume 45– No.21, May 2012.
[4] Ankita Gaur, VineetRichariya, “A Layered
Approach for Intrusion DetectionUsing
Meta-modeling with
ClassificationTechniques,” International
Journal of Computer Technology and
Electronics Engineering (IJCTEE) Volume 1
, Issue 2.
[5] Weka:
http://www.cs.waikato.ac.nz/~ml/weka/
[6] “NSL-KDD dataset for network –based
intrusion detectionsystems” available on
http://iscx.info/NSL-KDD/
65.00%
69.00%
73.00%
77.00%
81.00%
85.00%
89.00%
93.00%
97.00%
101.00%
105.00%
DoS Probe R2L U2R
[1]
[3]
[4]
Our Approach
Proceedings of 2013 IEEE Conference on Information and Communication Technologies (ICT 2013)
978-1-4673-5758-6/13/$31.00 © 2013 IEEE 1117

Más contenido relacionado

La actualidad más candente

IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
ijceronline
 

La actualidad más candente (18)

Layered approach
Layered approachLayered approach
Layered approach
 
Internet Worm Classification and Detection using Data Mining Techniques
Internet Worm Classification and Detection using Data Mining TechniquesInternet Worm Classification and Detection using Data Mining Techniques
Internet Worm Classification and Detection using Data Mining Techniques
 
A New Way of Identifying DOS Attack Using Multivariate Correlation Analysis
A New Way of Identifying DOS Attack Using Multivariate Correlation AnalysisA New Way of Identifying DOS Attack Using Multivariate Correlation Analysis
A New Way of Identifying DOS Attack Using Multivariate Correlation Analysis
 
IJAEIT 20
IJAEIT 20IJAEIT 20
IJAEIT 20
 
Limiting Self-Propagating Malware Based on Connection Failure Behavior
Limiting Self-Propagating Malware Based on Connection Failure Behavior Limiting Self-Propagating Malware Based on Connection Failure Behavior
Limiting Self-Propagating Malware Based on Connection Failure Behavior
 
Analyze and Detect Packet Loss for Data Transmission in WSN
Analyze and Detect Packet Loss for Data Transmission in WSNAnalyze and Detect Packet Loss for Data Transmission in WSN
Analyze and Detect Packet Loss for Data Transmission in WSN
 
Hybrid Technique for Detection of Denial of Service (DOS) Attack in Wireless ...
Hybrid Technique for Detection of Denial of Service (DOS) Attack in Wireless ...Hybrid Technique for Detection of Denial of Service (DOS) Attack in Wireless ...
Hybrid Technique for Detection of Denial of Service (DOS) Attack in Wireless ...
 
Review on Intrusion Detection in MANETs
Review on Intrusion Detection in MANETsReview on Intrusion Detection in MANETs
Review on Intrusion Detection in MANETs
 
Layered Approach & HMM for Network Based Intrusion Dection
Layered Approach & HMM for Network Based Intrusion DectionLayered Approach & HMM for Network Based Intrusion Dection
Layered Approach & HMM for Network Based Intrusion Dection
 
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetGenetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
 
IEEE 2014 DOTNET PARALLEL DISTRIBUTED PROJECTS A probabilistic-misbehavior-de...
IEEE 2014 DOTNET PARALLEL DISTRIBUTED PROJECTS A probabilistic-misbehavior-de...IEEE 2014 DOTNET PARALLEL DISTRIBUTED PROJECTS A probabilistic-misbehavior-de...
IEEE 2014 DOTNET PARALLEL DISTRIBUTED PROJECTS A probabilistic-misbehavior-de...
 
NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Net...
NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Net...NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Net...
NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Net...
 
1855 1860
1855 18601855 1860
1855 1860
 
CROSS LAYER INTRUSION DETECTION SYSTEM FOR WIRELESS SENSOR NETWORK
CROSS LAYER INTRUSION DETECTION SYSTEM FOR WIRELESS SENSOR NETWORKCROSS LAYER INTRUSION DETECTION SYSTEM FOR WIRELESS SENSOR NETWORK
CROSS LAYER INTRUSION DETECTION SYSTEM FOR WIRELESS SENSOR NETWORK
 
Lz3421532161
Lz3421532161Lz3421532161
Lz3421532161
 
A NOVEL TWO-STAGE ALGORITHM PROTECTING INTERNAL ATTACK FROM WSNS
A NOVEL TWO-STAGE ALGORITHM PROTECTING  INTERNAL ATTACK FROM WSNSA NOVEL TWO-STAGE ALGORITHM PROTECTING  INTERNAL ATTACK FROM WSNS
A NOVEL TWO-STAGE ALGORITHM PROTECTING INTERNAL ATTACK FROM WSNS
 
A Survey on Data Intrusion schemes used in MANET
A Survey on Data Intrusion schemes used in MANETA Survey on Data Intrusion schemes used in MANET
A Survey on Data Intrusion schemes used in MANET
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 

Similar a 06558266

COPYRIGHTThis thesis is copyright materials protected under the .docx
COPYRIGHTThis thesis is copyright materials protected under the .docxCOPYRIGHTThis thesis is copyright materials protected under the .docx
COPYRIGHTThis thesis is copyright materials protected under the .docx
voversbyobersby
 
Enhanced Intrusion Detection System using Feature Selection Method and Ensemb...
Enhanced Intrusion Detection System using Feature Selection Method and Ensemb...Enhanced Intrusion Detection System using Feature Selection Method and Ensemb...
Enhanced Intrusion Detection System using Feature Selection Method and Ensemb...
IJCSIS Research Publications
 

Similar a 06558266 (20)

EFFICIENT IDENTIFICATION AND REDUCTION OF MULTIPLE ATTACKS ADD VICTIMISATION ...
EFFICIENT IDENTIFICATION AND REDUCTION OF MULTIPLE ATTACKS ADD VICTIMISATION ...EFFICIENT IDENTIFICATION AND REDUCTION OF MULTIPLE ATTACKS ADD VICTIMISATION ...
EFFICIENT IDENTIFICATION AND REDUCTION OF MULTIPLE ATTACKS ADD VICTIMISATION ...
 
1850 1854
1850 18541850 1854
1850 1854
 
1850 1854
1850 18541850 1854
1850 1854
 
ATTACK DETECTION AVAILING FEATURE DISCRETION USING RANDOM FOREST CLASSIFIER
ATTACK DETECTION AVAILING FEATURE DISCRETION USING RANDOM FOREST CLASSIFIERATTACK DETECTION AVAILING FEATURE DISCRETION USING RANDOM FOREST CLASSIFIER
ATTACK DETECTION AVAILING FEATURE DISCRETION USING RANDOM FOREST CLASSIFIER
 
Attack Detection Availing Feature Discretion using Random Forest Classifier
Attack Detection Availing Feature Discretion using Random Forest ClassifierAttack Detection Availing Feature Discretion using Random Forest Classifier
Attack Detection Availing Feature Discretion using Random Forest Classifier
 
COPYRIGHTThis thesis is copyright materials protected under the .docx
COPYRIGHTThis thesis is copyright materials protected under the .docxCOPYRIGHTThis thesis is copyright materials protected under the .docx
COPYRIGHTThis thesis is copyright materials protected under the .docx
 
Intrusion Detection Systems By Anamoly-Based Using Neural Network
Intrusion Detection Systems By Anamoly-Based Using Neural NetworkIntrusion Detection Systems By Anamoly-Based Using Neural Network
Intrusion Detection Systems By Anamoly-Based Using Neural Network
 
Evaluation of network intrusion detection using markov chain
Evaluation of network intrusion detection using markov chainEvaluation of network intrusion detection using markov chain
Evaluation of network intrusion detection using markov chain
 
145 148
145 148145 148
145 148
 
Enhanced Intrusion Detection System using Feature Selection Method and Ensemb...
Enhanced Intrusion Detection System using Feature Selection Method and Ensemb...Enhanced Intrusion Detection System using Feature Selection Method and Ensemb...
Enhanced Intrusion Detection System using Feature Selection Method and Ensemb...
 
A45010107
A45010107A45010107
A45010107
 
A45010107
A45010107A45010107
A45010107
 
A SURVEY ON DIFFERENT MACHINE LEARNING ALGORITHMS AND WEAK CLASSIFIERS BASED ...
A SURVEY ON DIFFERENT MACHINE LEARNING ALGORITHMS AND WEAK CLASSIFIERS BASED ...A SURVEY ON DIFFERENT MACHINE LEARNING ALGORITHMS AND WEAK CLASSIFIERS BASED ...
A SURVEY ON DIFFERENT MACHINE LEARNING ALGORITHMS AND WEAK CLASSIFIERS BASED ...
 
A SURVEY ON DIFFERENT MACHINE LEARNING ALGORITHMS AND WEAK CLASSIFIERS BASED ...
A SURVEY ON DIFFERENT MACHINE LEARNING ALGORITHMS AND WEAK CLASSIFIERS BASED ...A SURVEY ON DIFFERENT MACHINE LEARNING ALGORITHMS AND WEAK CLASSIFIERS BASED ...
A SURVEY ON DIFFERENT MACHINE LEARNING ALGORITHMS AND WEAK CLASSIFIERS BASED ...
 
A Survey on Different Machine Learning Algorithms and Weak Classifiers Based ...
A Survey on Different Machine Learning Algorithms and Weak Classifiers Based ...A Survey on Different Machine Learning Algorithms and Weak Classifiers Based ...
A Survey on Different Machine Learning Algorithms and Weak Classifiers Based ...
 
An Approach of Automatic Data Mining Algorithm for Intrusion Detection and P...
An Approach of Automatic Data Mining Algorithm for Intrusion  Detection and P...An Approach of Automatic Data Mining Algorithm for Intrusion  Detection and P...
An Approach of Automatic Data Mining Algorithm for Intrusion Detection and P...
 
Ak03402100217
Ak03402100217Ak03402100217
Ak03402100217
 
F0371046050
F0371046050F0371046050
F0371046050
 
MULTI-LAYER CLASSIFIER FOR MINIMIZING FALSE INTRUSION
MULTI-LAYER CLASSIFIER FOR MINIMIZING FALSE INTRUSIONMULTI-LAYER CLASSIFIER FOR MINIMIZING FALSE INTRUSION
MULTI-LAYER CLASSIFIER FOR MINIMIZING FALSE INTRUSION
 
Survey on classification techniques for intrusion detection
Survey on classification techniques for intrusion detectionSurvey on classification techniques for intrusion detection
Survey on classification techniques for intrusion detection
 

Último

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Último (20)

Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 

06558266

  • 1. Multi-Classification Approach for Detecting Network Attacks. A.Kumaravel , Professor and Dean, M.Niraisha,PG Student, Department of Computer Science and Engineering. Bharath University, Selaiyur, Chennai-600073, India drkumaravel@gmail.com , naga_sharaini@yahoo.co.in Abstract Intrusion Detection System (IDS) has increasingly become a crucial issue for computer and network systems. Intrusion poses a serious security risk in a network environment. The ever growing new intrusion types pose a serious problem for their detection. The acceptability and usability of Intrusion Detection Systems get seriously affected with the data in network traffic. A large number of false alarms mean a lot in terms of the acceptability of Intrusion Detection Systems[1].In this paper we consider the dataset with multi classes and propose the classification for each type of attacks in a separate layer. In this work, a multi- classification approach for detecting network attacks is designed and developed to achieve high efficiency and improve the detection and classification rate accuracy [6]. Keywords:Network Security, DataMining, Intrusion detection system,Classification,Layered approach. 1. INTRODUCTION An Intrusion Detection System (IDS) provides an additional layer of security to network's perimeter defense, which is usually, implemented using a firewall. The goal of IDS is to collect information from a variety of systems and network sources, and then analyze the information for signs of intrusion and misuse. IDSs are implemented in hardware, software, or a combination of both. On theother hand, our computers are under attacks and vulnerable to many threats. There is anincreasing availability of tools and tricks for attacking and intruding networks. An intrusion canbe defined as any set of actions that threaten the security requirements (e.g., integrity,confidentiality, availability) of computer/network resource (e.g., user accounts, file systems,and system kernels). Intruders have promoted themselves and invented innovative toolsthat support various types of network attacks. Hence, effective methods for intrusion detection (ID) have become an insisting need to protect our computers from intruders. In general, thereare two types of Intrusion Detection Systems (IDS); misuse detection systems and anomalydetection systems. The problem of designing IDSs to work effectively and yield higher accuracies for minor attacks even in the mix of data has been receiving serious attention in recent times. The imbalance in data degrades the prediction accuracy. In most of the available literature this is overcome by resampling the training distribution. The resampling is done either by oversampling of the minority class or by under sampling of the majority class. Classification is perhaps the most familiar and most popular data mining technique.Prediction can be thought of as classifying an attribute value into one of a set of possible classes. The subject is introduced briefly as following, Insection 2, formulates the problem. Insection 3, theexperimental results and analysis. We present the conclusion in section 4. 2. PROBLEM STATEMENT Our system is a modular network-based intrusion detection system that analyzes TCP dump data using data mining techniques to classify the network records to not only normal and attack but also identify attack type. The proposed system consists of two stages. First stage is for attack detection and the second stage is for attack classification in multi-layer [1]. The data is input in the first Stage. 2.1The Proposed Layered-Model Intrusion Detection System The main characteristics of our system: First, our system has the capability of classifying network intruders into two stages[2]. The first stage classifies the network records to either normal or attack. The second stage consists of four sequential Layers which can identify four categories/classes and their attack type. The data is input in the first stage which identifies if this record is a normal record or attack. If the record is identified as an attack then the module would raise a flag to the administrator that the coming record is an attack then the module inputs this record to the second stage which consists of four sequential Layers, one for each class type (R2L,U2R,Dos,Probe)[3]. Each Layer is responsible for identifying the attack type of coming record according to its class type. Proceedings of 2013 IEEE Conference on Information and Communication Technologies (ICT 2013) 978-1-4673-5758-6/13/$31.00 © 2013 IEEE 1114
  • 2. Fig.1 Layered-Model Approach System Else the attack passes through the next Second, it takes less training decrease in each layer where we u dataset for training stage 1 then instage the attacks for training excluding the n Then each layer act as a filters that attacks of each layer category which need of further processing at subsequ we took in consideration the propagati to simulate the real system and res accurate and real . In many situations, there i between efficiency and accuracy of th there can be various avenues to im performance. We implement the Laye to improve overall system performance intrusion detection model using JRip high efficiency and improves the classification with high rate of accuracy 3. EXPERIMENTAL ANALYSIS AND In this section, first we dataset.Apply the dataset in Wekatoo Classification results.The datasets experiments are from NSL-KDD [6] n IDSs. Although, the proposed data s from some of the problems and may n representative of existing real network the lack of public data sets for networ but still it can be applied as an effecti data set to help researchers comp intrusion detection methods. 3.1 Dataset 3.1.1 DatasetDescription Network based IDSs of nsl.cs was about four gigabytes of compresse dump data from seven weeks of netwo was processed into about five millio layer. time and even use the whole e 2 we use only normal records. t classifies the h eliminate the uent layers but on of errors as sults be more is a trade-off he system and mprove system ered Approach e as our layered pRule achieves detection and y. RESULTS e collect the ol [5] to find s for these network based et still suffers not be a perfect ks, because of rk-based IDSs, ive benchmark pare different s.The raw data ed binary TCP rk traffic. This on connection records. Similarly, the two weeks around two million connection re is a sequence of TCP packets sta some well-defined times, betwee to and from a source IP address t under some well-defined protocol labeled as either normal, or as an one specific attack type. Each consists of about 100 bytes. Actu in dataset.7000 instances that train Attacks fall into four main catego • DOS: denial-o flood; • R2L: unauthor remote machi password; • U2R: unauthor superuser (roo various ``buffer • Probing: surve probing, e.g., po 3.1.2 AttributeDescription Duration length (numb the connectio protocol type type of the p udp, etc. Service network serv destination, src_bytes number of da source to des dst_bytes number of da destination t Land 1 if connecti same host/po wrong_fragment number of `` Urgent number of ur srv_count number of co same service connection in seconds srv_serror_rate % of connec ``SYN'' error srv_rerror_rate % of connec ``REJ'' error srv_diff_host_rate % of connec hosts 3.2 Performance evaluation During the analysis of in observe two mainchallenging iss First, the number of intrusions typically a very small fraction Therefore the essential step is to s of test data yielded ecords. A connection arting and ending at en which data flows to a target IP address l. Each connection is n attack, with exactly h connection record ually 42 attributes are ning dataset. ories: of-service, e.g. syn rized access from a ine, e.g. guessing rized access to local ot) privileges, e.g., r overflow'' attacks; eillance and other ort scanning. ber of seconds) of on protocol, e.g. tcp, vice on the e.g., http, telnet,etc. ata bytes from stination ata bytes from o source ion is from/to the ort; 0 otherwise `wrong'' fragments rgent packets onnections to the e as the current n the past two ctions that have rs ctions that have s ctions to different ntrusion detection we sues in this system. son the network is of the totaltraffic. o select attributes of Proceedings of 2013 IEEE Conference on Information and Communication Technologies (ICT 2013) 978-1-4673-5758-6/13/$31.00 © 2013 IEEE 1115
  • 3. the various Layers. Second, the attacks are classified in their impact and hence, it becomes necessary to treat them differently. To improve the minority attack detection rate, while maintaining the overall detection rate. We proposed a layered modelwith various classifiers (BayesNet, NavieBayes,DecisionStump and rulesJrip) on values. In layered model we definefour layers that correspond to the four attack groups i.e. DoSlayerfor detecting DoS attacks, Probe layer for detecting Probe attacks,R2L layer for detecting R2L attacks and U2R for U2R attacks. 3.2.1 Attribute Selection Attribute selection usingweka tool. Table 1 shows the weight calculation of the selected attributes depends on its impact. TABLE 1: Selected Attributes Layer. No Layer No. of attributes selected Selected attributes 1 R2L Layer 9 1,5,10,11,22,27,31,33,36 2 U2R Layer 8 1,6,13,14,16,17,23,34 3 Dos Layer 7 5,6,10,19,31,37,41 4 Probe Layer 5 5,6,34,36,37 3.2.2 Classification with Stages 3.2.2.1 First Stage Results Stage 1 is to classify whether coming record is normal or attack. It is observed that JRip has a significant detection rate for known and unknown attacks compared to BN, DS and NB.The results of Stage 1 are shown in table 2. TABLE 2: First stage classification Method correctly classified IN correctly classified bayes.BayesNet 98.73% 1.26% bayes.NaiveBayes 92.41% 7.58% rules.Jrip 99.89% 0.10% trees.DecisionStump 94.65% 5.34% 3.2.2.2 Second Stage Results Records classified as attacks by the first Stage are introduced to second Stage which is responsible for classifying coming attack to one of the four classes (DOS, Probe, U2R and R2L) and identifying its attack type. Stage 2 consists of four sequential layers; a layer for each class which identify the class of each coming attack. DoS Layer: The results of Stage 2 DoS Layer are shown in table 3. TABLE 3: Classification of DoS Layer Method correctly classified IN correctly classified bayes.BayesNet 99.79% 0.21% bayes.NaiveBayes 96.03% 3.97% rules.Jrip 99.98% 0.02% trees.DecisionStump 94.01% 5.99% Probe Layer: The results of Stage 2 Probe Layer are shown in table 4. TABLE 4: Classification of Probe Layer Method correctly classified IN correctly classified bayes.BayesNet 99.17% 0.83% bayes.NaiveBayes 97.93% 2.07% rules.Jrip 99.79% 0.21% trees.DecisionStump 98.34% 1.66% R2L Layer: The results of Stage 2 R2L Layer are shown in table 5. TABLE 5: Classification of R2L Layer Method correctly classified IN correctly classified bayes.BayesNet 95.22% 4.78% bayes.NaiveBayes 94.99% 5.01% rules.Jrip 99.77% 0.23% trees.DecisionStump 95.67% 4.33% U2R Layer: The results of Stage 2 U2R Layer are shown in table 6. Proceedings of 2013 IEEE Conference on Information and Communication Technologies (ICT 2013) 978-1-4673-5758-6/13/$31.00 © 2013 IEEE 1116
  • 4. TABLE 6: Classification of U2R Layer Method correctly classified IN correctly classified bayes.BayesNet 99.54% 0.46% bayes.NaiveBayes 97.68% 2.32% rules.Jrip 99.98% 0.02% trees.DecisionStump 99.77% 0.23% We compare this non-layered approach with the layered approach. We observe that the layered approach with featureselection is more efficient and more accurate in detecting attacks. 4. PERFORMANCE COMPARISON WITH EXISTING APPROACHES In this section, we compare the performance of our approach with other works in this field. This information is shown in Table 7. TABLE 7: Performance comparison with existing system. Existing Paper DoS Probe R2L U2R [2] 93.9% 98.2% 96.4% 65.4% [3] 96.8% 99.0% 99.9% 73.2% [4] 97.99% 97.23% 98.52% 99.49% Our Approach 99.98% 99.79% 99.77% 99.98% GRAPH.1 Performance comparison with existing system. According to the above table, proposed system has good performance that is competitive with other approaches based on classification accuracy which is shown in graph.1 5. CONCLUSIONS A multi-Layer intrusion detection system has been developed to achieve high efficiency and improve detection and classification accuracy. The proposed system consists of two stages. First stage is for attack detection and the second stage is for attack classification. The data is input in the first Stage which identifies if this record is a normal record or attack. Experimental results indicate that the proposed layered model with JRip classifier can result in better prediction of minority classes without hurting the prediction performance of the majority class. It gives result for DoS Layer- 99.98%, Probe Layer- 99.79%, R2L- 99.77%, U2R- 99.98%. ACKNOWLEDGEMENTS The authors would like to thank the management of Bharath University for the support and encouragement for this research work. REFERENCES [1] OludeleAwodele, Sunday Idowu, OmotolaAnjorin, andVincent J. Joshua, “A Multi-Layered Approach to the Design of Intelligent Intrusion Detection and Prevention System(IIDPS),” Issues in Informing Science and InformationTechnology Volume 6, 2009. [2] Neelam Sharma, Saurabh Mukherjee, “Layered Approach for Intrusion Detection Using NaïveBayes Classifier,” ICACCI’12, August 3-5, 2012, Chennai, T Nadu, India. [3] P. GiftyJeya, M.Ravichandran, C.S. Ravichandran, “Efficient Classifier for R2L and U2R Attacks,” International Journal of Computer Applications (0975 – 8887)Volume 45– No.21, May 2012. [4] Ankita Gaur, VineetRichariya, “A Layered Approach for Intrusion DetectionUsing Meta-modeling with ClassificationTechniques,” International Journal of Computer Technology and Electronics Engineering (IJCTEE) Volume 1 , Issue 2. [5] Weka: http://www.cs.waikato.ac.nz/~ml/weka/ [6] “NSL-KDD dataset for network –based intrusion detectionsystems” available on http://iscx.info/NSL-KDD/ 65.00% 69.00% 73.00% 77.00% 81.00% 85.00% 89.00% 93.00% 97.00% 101.00% 105.00% DoS Probe R2L U2R [1] [3] [4] Our Approach Proceedings of 2013 IEEE Conference on Information and Communication Technologies (ICT 2013) 978-1-4673-5758-6/13/$31.00 © 2013 IEEE 1117