Implementation and Analysis of Combined Machine Learning Method for Intrusion Detection System

As one of the security components in Network Security Monitoring System, Intrusion Detection System (IDS) is implemented by many organizations in their networks to detect and address the impact of network attacks. Many machine-learning methods have been widely developed and applied in the IDS. Selec...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:International journal of communication networks and information security 2018-08, Vol.10 (2), p.295-304
Hauptverfasser: Wahyudi, Bisyron, Ramli, Kalamullah, Murfi, Hendri
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 304
container_issue 2
container_start_page 295
container_title International journal of communication networks and information security
container_volume 10
creator Wahyudi, Bisyron
Ramli, Kalamullah
Murfi, Hendri
description As one of the security components in Network Security Monitoring System, Intrusion Detection System (IDS) is implemented by many organizations in their networks to detect and address the impact of network attacks. Many machine-learning methods have been widely developed and applied in the IDS. Selection of appropriate methods is necessary to improve the detection accuracy in the application of machine-learning in IDS. In this research, we proposed an IDS that we developed based on machine learning approach. We use 28 features subset without content features of Knowledge Data Discovery (KDD) dataset to build machine learning model and are most likely to be applied for the IDS in the real network. The machine learning model based on this 28 features subset achieves 99.9% accuracy for both two-class and multiclass classification. From our experiments using the IDS, we have developed good performance in detecting attacks on real networks.
format Article
fullrecord <record><control><sourceid>proquest</sourceid><recordid>TN_cdi_proquest_journals_2136371074</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2136371074</sourcerecordid><originalsourceid>FETCH-LOGICAL-p98t-4af664b688b8d8f7605e9ed1e443404cd3cf296bc196e57a5b156f7e7d7f02043</originalsourceid><addsrcrecordid>eNotj71OwzAURiMEEqXwDpaYI93EznU8VuEvUioGOjBROfE1TZXYIXaHvj2lZfrO8h3pXCWLHCSmoDhcn5mnCPLzNrkLYQ-ACKAWyVc9TgON5KKOvXdMO8NWTg_H0AfmLav82PaODFvrbncC1pCeXe--2Zrizhtm_cxqF-dD-Ls_UaTuLPo4hkjjfXJj9RDo4X-XyebleVO9pc37a12tmnRSZUyFtoiixbJsS1NaiVCQIpOREFyA6AzvbK6w7TKFVEhdtFmBVpI00kIOgi-Tx4t2mv3PgULc7v1hPmWEbZ5x5DIDKfgvN01RMA</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2136371074</pqid></control><display><type>article</type><title>Implementation and Analysis of Combined Machine Learning Method for Intrusion Detection System</title><source>EZB-FREE-00999 freely available EZB journals</source><creator>Wahyudi, Bisyron ; Ramli, Kalamullah ; Murfi, Hendri</creator><creatorcontrib>Wahyudi, Bisyron ; Ramli, Kalamullah ; Murfi, Hendri</creatorcontrib><description>As one of the security components in Network Security Monitoring System, Intrusion Detection System (IDS) is implemented by many organizations in their networks to detect and address the impact of network attacks. Many machine-learning methods have been widely developed and applied in the IDS. Selection of appropriate methods is necessary to improve the detection accuracy in the application of machine-learning in IDS. In this research, we proposed an IDS that we developed based on machine learning approach. We use 28 features subset without content features of Knowledge Data Discovery (KDD) dataset to build machine learning model and are most likely to be applied for the IDS in the real network. The machine learning model based on this 28 features subset achieves 99.9% accuracy for both two-class and multiclass classification. From our experiments using the IDS, we have developed good performance in detecting attacks on real networks.</description><identifier>ISSN: 2073-607X</identifier><identifier>EISSN: 2076-0930</identifier><language>eng</language><publisher>Kohat: Kohat University of Science and Technology (KUST)</publisher><subject>Accuracy ; Algorithms ; Artificial intelligence ; Cybersecurity ; Data encryption ; Datasets ; International conferences ; Internet ; Intrusion detection systems ; Machine learning ; Researchers</subject><ispartof>International journal of communication networks and information security, 2018-08, Vol.10 (2), p.295-304</ispartof><rights>Copyright Kohat University of Science and Technology (KUST) Aug 2018</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>315,782,786</link.rule.ids></links><search><creatorcontrib>Wahyudi, Bisyron</creatorcontrib><creatorcontrib>Ramli, Kalamullah</creatorcontrib><creatorcontrib>Murfi, Hendri</creatorcontrib><title>Implementation and Analysis of Combined Machine Learning Method for Intrusion Detection System</title><title>International journal of communication networks and information security</title><description>As one of the security components in Network Security Monitoring System, Intrusion Detection System (IDS) is implemented by many organizations in their networks to detect and address the impact of network attacks. Many machine-learning methods have been widely developed and applied in the IDS. Selection of appropriate methods is necessary to improve the detection accuracy in the application of machine-learning in IDS. In this research, we proposed an IDS that we developed based on machine learning approach. We use 28 features subset without content features of Knowledge Data Discovery (KDD) dataset to build machine learning model and are most likely to be applied for the IDS in the real network. The machine learning model based on this 28 features subset achieves 99.9% accuracy for both two-class and multiclass classification. From our experiments using the IDS, we have developed good performance in detecting attacks on real networks.</description><subject>Accuracy</subject><subject>Algorithms</subject><subject>Artificial intelligence</subject><subject>Cybersecurity</subject><subject>Data encryption</subject><subject>Datasets</subject><subject>International conferences</subject><subject>Internet</subject><subject>Intrusion detection systems</subject><subject>Machine learning</subject><subject>Researchers</subject><issn>2073-607X</issn><issn>2076-0930</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2018</creationdate><recordtype>article</recordtype><sourceid>ABUWG</sourceid><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><sourceid>GNUQQ</sourceid><recordid>eNotj71OwzAURiMEEqXwDpaYI93EznU8VuEvUioGOjBROfE1TZXYIXaHvj2lZfrO8h3pXCWLHCSmoDhcn5mnCPLzNrkLYQ-ACKAWyVc9TgON5KKOvXdMO8NWTg_H0AfmLav82PaODFvrbncC1pCeXe--2Zrizhtm_cxqF-dD-Ls_UaTuLPo4hkjjfXJj9RDo4X-XyebleVO9pc37a12tmnRSZUyFtoiixbJsS1NaiVCQIpOREFyA6AzvbK6w7TKFVEhdtFmBVpI00kIOgi-Tx4t2mv3PgULc7v1hPmWEbZ5x5DIDKfgvN01RMA</recordid><startdate>20180801</startdate><enddate>20180801</enddate><creator>Wahyudi, Bisyron</creator><creator>Ramli, Kalamullah</creator><creator>Murfi, Hendri</creator><general>Kohat University of Science and Technology (KUST)</general><scope>3V.</scope><scope>4T-</scope><scope>4U-</scope><scope>7RQ</scope><scope>7XB</scope><scope>88F</scope><scope>88I</scope><scope>88K</scope><scope>8AL</scope><scope>8FE</scope><scope>8FG</scope><scope>8FK</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>M0N</scope><scope>M1Q</scope><scope>M2P</scope><scope>M2T</scope><scope>P5Z</scope><scope>P62</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>Q9U</scope><scope>U9A</scope></search><sort><creationdate>20180801</creationdate><title>Implementation and Analysis of Combined Machine Learning Method for Intrusion Detection System</title><author>Wahyudi, Bisyron ; Ramli, Kalamullah ; Murfi, Hendri</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-p98t-4af664b688b8d8f7605e9ed1e443404cd3cf296bc196e57a5b156f7e7d7f02043</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2018</creationdate><topic>Accuracy</topic><topic>Algorithms</topic><topic>Artificial intelligence</topic><topic>Cybersecurity</topic><topic>Data encryption</topic><topic>Datasets</topic><topic>International conferences</topic><topic>Internet</topic><topic>Intrusion detection systems</topic><topic>Machine learning</topic><topic>Researchers</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Wahyudi, Bisyron</creatorcontrib><creatorcontrib>Ramli, Kalamullah</creatorcontrib><creatorcontrib>Murfi, Hendri</creatorcontrib><collection>ProQuest Central (Corporate)</collection><collection>Docstoc</collection><collection>University Readers</collection><collection>Career &amp; Technical Education Database</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>Military Database (Alumni Edition)</collection><collection>Science Database (Alumni Edition)</collection><collection>Telecommunications (Alumni Edition)</collection><collection>Computing Database (Alumni Edition)</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer Science Database</collection><collection>Computing Database</collection><collection>Military Database</collection><collection>Science Database</collection><collection>Telecommunications Database</collection><collection>Advanced Technologies &amp; Aerospace Database</collection><collection>ProQuest Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>ProQuest Central Basic</collection><jtitle>International journal of communication networks and information security</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Wahyudi, Bisyron</au><au>Ramli, Kalamullah</au><au>Murfi, Hendri</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Implementation and Analysis of Combined Machine Learning Method for Intrusion Detection System</atitle><jtitle>International journal of communication networks and information security</jtitle><date>2018-08-01</date><risdate>2018</risdate><volume>10</volume><issue>2</issue><spage>295</spage><epage>304</epage><pages>295-304</pages><issn>2073-607X</issn><eissn>2076-0930</eissn><abstract>As one of the security components in Network Security Monitoring System, Intrusion Detection System (IDS) is implemented by many organizations in their networks to detect and address the impact of network attacks. Many machine-learning methods have been widely developed and applied in the IDS. Selection of appropriate methods is necessary to improve the detection accuracy in the application of machine-learning in IDS. In this research, we proposed an IDS that we developed based on machine learning approach. We use 28 features subset without content features of Knowledge Data Discovery (KDD) dataset to build machine learning model and are most likely to be applied for the IDS in the real network. The machine learning model based on this 28 features subset achieves 99.9% accuracy for both two-class and multiclass classification. From our experiments using the IDS, we have developed good performance in detecting attacks on real networks.</abstract><cop>Kohat</cop><pub>Kohat University of Science and Technology (KUST)</pub><tpages>10</tpages></addata></record>
fulltext fulltext
identifier ISSN: 2073-607X
ispartof International journal of communication networks and information security, 2018-08, Vol.10 (2), p.295-304
issn 2073-607X
2076-0930
language eng
recordid cdi_proquest_journals_2136371074
source EZB-FREE-00999 freely available EZB journals
subjects Accuracy
Algorithms
Artificial intelligence
Cybersecurity
Data encryption
Datasets
International conferences
Internet
Intrusion detection systems
Machine learning
Researchers
title Implementation and Analysis of Combined Machine Learning Method for Intrusion Detection System
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-03T08%3A01%3A37IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Implementation%20and%20Analysis%20of%20Combined%20Machine%20Learning%20Method%20for%20Intrusion%20Detection%20System&rft.jtitle=International%20journal%20of%20communication%20networks%20and%20information%20security&rft.au=Wahyudi,%20Bisyron&rft.date=2018-08-01&rft.volume=10&rft.issue=2&rft.spage=295&rft.epage=304&rft.pages=295-304&rft.issn=2073-607X&rft.eissn=2076-0930&rft_id=info:doi/&rft_dat=%3Cproquest%3E2136371074%3C/proquest%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2136371074&rft_id=info:pmid/&rfr_iscdi=true