Implementation and Analysis of Combined Machine Learning Method for Intrusion Detection System
As one of the security components in Network Security Monitoring System, Intrusion Detection System (IDS) is implemented by many organizations in their networks to detect and address the impact of network attacks. Many machine-learning methods have been widely developed and applied in the IDS. Selec...
Gespeichert in:
Veröffentlicht in: | International journal of communication networks and information security 2018-08, Vol.10 (2), p.295-304 |
---|---|
Hauptverfasser: | , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 304 |
---|---|
container_issue | 2 |
container_start_page | 295 |
container_title | International journal of communication networks and information security |
container_volume | 10 |
creator | Wahyudi, Bisyron Ramli, Kalamullah Murfi, Hendri |
description | As one of the security components in Network Security Monitoring System, Intrusion Detection System (IDS) is implemented by many organizations in their networks to detect and address the impact of network attacks. Many machine-learning methods have been widely developed and applied in the IDS. Selection of appropriate methods is necessary to improve the detection accuracy in the application of machine-learning in IDS. In this research, we proposed an IDS that we developed based on machine learning approach. We use 28 features subset without content features of Knowledge Data Discovery (KDD) dataset to build machine learning model and are most likely to be applied for the IDS in the real network. The machine learning model based on this 28 features subset achieves 99.9% accuracy for both two-class and multiclass classification. From our experiments using the IDS, we have developed good performance in detecting attacks on real networks. |
format | Article |
fullrecord | <record><control><sourceid>proquest</sourceid><recordid>TN_cdi_proquest_journals_2136371074</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2136371074</sourcerecordid><originalsourceid>FETCH-LOGICAL-p98t-4af664b688b8d8f7605e9ed1e443404cd3cf296bc196e57a5b156f7e7d7f02043</originalsourceid><addsrcrecordid>eNotj71OwzAURiMEEqXwDpaYI93EznU8VuEvUioGOjBROfE1TZXYIXaHvj2lZfrO8h3pXCWLHCSmoDhcn5mnCPLzNrkLYQ-ACKAWyVc9TgON5KKOvXdMO8NWTg_H0AfmLav82PaODFvrbncC1pCeXe--2Zrizhtm_cxqF-dD-Ls_UaTuLPo4hkjjfXJj9RDo4X-XyebleVO9pc37a12tmnRSZUyFtoiixbJsS1NaiVCQIpOREFyA6AzvbK6w7TKFVEhdtFmBVpI00kIOgi-Tx4t2mv3PgULc7v1hPmWEbZ5x5DIDKfgvN01RMA</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2136371074</pqid></control><display><type>article</type><title>Implementation and Analysis of Combined Machine Learning Method for Intrusion Detection System</title><source>EZB-FREE-00999 freely available EZB journals</source><creator>Wahyudi, Bisyron ; Ramli, Kalamullah ; Murfi, Hendri</creator><creatorcontrib>Wahyudi, Bisyron ; Ramli, Kalamullah ; Murfi, Hendri</creatorcontrib><description>As one of the security components in Network Security Monitoring System, Intrusion Detection System (IDS) is implemented by many organizations in their networks to detect and address the impact of network attacks. Many machine-learning methods have been widely developed and applied in the IDS. Selection of appropriate methods is necessary to improve the detection accuracy in the application of machine-learning in IDS. In this research, we proposed an IDS that we developed based on machine learning approach. We use 28 features subset without content features of Knowledge Data Discovery (KDD) dataset to build machine learning model and are most likely to be applied for the IDS in the real network. The machine learning model based on this 28 features subset achieves 99.9% accuracy for both two-class and multiclass classification. From our experiments using the IDS, we have developed good performance in detecting attacks on real networks.</description><identifier>ISSN: 2073-607X</identifier><identifier>EISSN: 2076-0930</identifier><language>eng</language><publisher>Kohat: Kohat University of Science and Technology (KUST)</publisher><subject>Accuracy ; Algorithms ; Artificial intelligence ; Cybersecurity ; Data encryption ; Datasets ; International conferences ; Internet ; Intrusion detection systems ; Machine learning ; Researchers</subject><ispartof>International journal of communication networks and information security, 2018-08, Vol.10 (2), p.295-304</ispartof><rights>Copyright Kohat University of Science and Technology (KUST) Aug 2018</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>315,782,786</link.rule.ids></links><search><creatorcontrib>Wahyudi, Bisyron</creatorcontrib><creatorcontrib>Ramli, Kalamullah</creatorcontrib><creatorcontrib>Murfi, Hendri</creatorcontrib><title>Implementation and Analysis of Combined Machine Learning Method for Intrusion Detection System</title><title>International journal of communication networks and information security</title><description>As one of the security components in Network Security Monitoring System, Intrusion Detection System (IDS) is implemented by many organizations in their networks to detect and address the impact of network attacks. Many machine-learning methods have been widely developed and applied in the IDS. Selection of appropriate methods is necessary to improve the detection accuracy in the application of machine-learning in IDS. In this research, we proposed an IDS that we developed based on machine learning approach. We use 28 features subset without content features of Knowledge Data Discovery (KDD) dataset to build machine learning model and are most likely to be applied for the IDS in the real network. The machine learning model based on this 28 features subset achieves 99.9% accuracy for both two-class and multiclass classification. From our experiments using the IDS, we have developed good performance in detecting attacks on real networks.</description><subject>Accuracy</subject><subject>Algorithms</subject><subject>Artificial intelligence</subject><subject>Cybersecurity</subject><subject>Data encryption</subject><subject>Datasets</subject><subject>International conferences</subject><subject>Internet</subject><subject>Intrusion detection systems</subject><subject>Machine learning</subject><subject>Researchers</subject><issn>2073-607X</issn><issn>2076-0930</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2018</creationdate><recordtype>article</recordtype><sourceid>ABUWG</sourceid><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><sourceid>GNUQQ</sourceid><recordid>eNotj71OwzAURiMEEqXwDpaYI93EznU8VuEvUioGOjBROfE1TZXYIXaHvj2lZfrO8h3pXCWLHCSmoDhcn5mnCPLzNrkLYQ-ACKAWyVc9TgON5KKOvXdMO8NWTg_H0AfmLav82PaODFvrbncC1pCeXe--2Zrizhtm_cxqF-dD-Ls_UaTuLPo4hkjjfXJj9RDo4X-XyebleVO9pc37a12tmnRSZUyFtoiixbJsS1NaiVCQIpOREFyA6AzvbK6w7TKFVEhdtFmBVpI00kIOgi-Tx4t2mv3PgULc7v1hPmWEbZ5x5DIDKfgvN01RMA</recordid><startdate>20180801</startdate><enddate>20180801</enddate><creator>Wahyudi, Bisyron</creator><creator>Ramli, Kalamullah</creator><creator>Murfi, Hendri</creator><general>Kohat University of Science and Technology (KUST)</general><scope>3V.</scope><scope>4T-</scope><scope>4U-</scope><scope>7RQ</scope><scope>7XB</scope><scope>88F</scope><scope>88I</scope><scope>88K</scope><scope>8AL</scope><scope>8FE</scope><scope>8FG</scope><scope>8FK</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>M0N</scope><scope>M1Q</scope><scope>M2P</scope><scope>M2T</scope><scope>P5Z</scope><scope>P62</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>Q9U</scope><scope>U9A</scope></search><sort><creationdate>20180801</creationdate><title>Implementation and Analysis of Combined Machine Learning Method for Intrusion Detection System</title><author>Wahyudi, Bisyron ; Ramli, Kalamullah ; Murfi, Hendri</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-p98t-4af664b688b8d8f7605e9ed1e443404cd3cf296bc196e57a5b156f7e7d7f02043</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2018</creationdate><topic>Accuracy</topic><topic>Algorithms</topic><topic>Artificial intelligence</topic><topic>Cybersecurity</topic><topic>Data encryption</topic><topic>Datasets</topic><topic>International conferences</topic><topic>Internet</topic><topic>Intrusion detection systems</topic><topic>Machine learning</topic><topic>Researchers</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Wahyudi, Bisyron</creatorcontrib><creatorcontrib>Ramli, Kalamullah</creatorcontrib><creatorcontrib>Murfi, Hendri</creatorcontrib><collection>ProQuest Central (Corporate)</collection><collection>Docstoc</collection><collection>University Readers</collection><collection>Career & Technical Education Database</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>Military Database (Alumni Edition)</collection><collection>Science Database (Alumni Edition)</collection><collection>Telecommunications (Alumni Edition)</collection><collection>Computing Database (Alumni Edition)</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies & Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer Science Database</collection><collection>Computing Database</collection><collection>Military Database</collection><collection>Science Database</collection><collection>Telecommunications Database</collection><collection>Advanced Technologies & Aerospace Database</collection><collection>ProQuest Advanced Technologies & Aerospace Collection</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>ProQuest Central Basic</collection><jtitle>International journal of communication networks and information security</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Wahyudi, Bisyron</au><au>Ramli, Kalamullah</au><au>Murfi, Hendri</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Implementation and Analysis of Combined Machine Learning Method for Intrusion Detection System</atitle><jtitle>International journal of communication networks and information security</jtitle><date>2018-08-01</date><risdate>2018</risdate><volume>10</volume><issue>2</issue><spage>295</spage><epage>304</epage><pages>295-304</pages><issn>2073-607X</issn><eissn>2076-0930</eissn><abstract>As one of the security components in Network Security Monitoring System, Intrusion Detection System (IDS) is implemented by many organizations in their networks to detect and address the impact of network attacks. Many machine-learning methods have been widely developed and applied in the IDS. Selection of appropriate methods is necessary to improve the detection accuracy in the application of machine-learning in IDS. In this research, we proposed an IDS that we developed based on machine learning approach. We use 28 features subset without content features of Knowledge Data Discovery (KDD) dataset to build machine learning model and are most likely to be applied for the IDS in the real network. The machine learning model based on this 28 features subset achieves 99.9% accuracy for both two-class and multiclass classification. From our experiments using the IDS, we have developed good performance in detecting attacks on real networks.</abstract><cop>Kohat</cop><pub>Kohat University of Science and Technology (KUST)</pub><tpages>10</tpages></addata></record> |
fulltext | fulltext |
identifier | ISSN: 2073-607X |
ispartof | International journal of communication networks and information security, 2018-08, Vol.10 (2), p.295-304 |
issn | 2073-607X 2076-0930 |
language | eng |
recordid | cdi_proquest_journals_2136371074 |
source | EZB-FREE-00999 freely available EZB journals |
subjects | Accuracy Algorithms Artificial intelligence Cybersecurity Data encryption Datasets International conferences Internet Intrusion detection systems Machine learning Researchers |
title | Implementation and Analysis of Combined Machine Learning Method for Intrusion Detection System |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-03T08%3A01%3A37IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Implementation%20and%20Analysis%20of%20Combined%20Machine%20Learning%20Method%20for%20Intrusion%20Detection%20System&rft.jtitle=International%20journal%20of%20communication%20networks%20and%20information%20security&rft.au=Wahyudi,%20Bisyron&rft.date=2018-08-01&rft.volume=10&rft.issue=2&rft.spage=295&rft.epage=304&rft.pages=295-304&rft.issn=2073-607X&rft.eissn=2076-0930&rft_id=info:doi/&rft_dat=%3Cproquest%3E2136371074%3C/proquest%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2136371074&rft_id=info:pmid/&rfr_iscdi=true |