Abstract
Intrusion detection system (IDS) is used to monitor the intrusions or suspicious actions over the network traffic data or in the computer system. In this paper, we propose an IDS for identifying the intrusion over the network traffic data. As the network traffic data are continuous in nature, we used the Gaussian Naïve Bayes classification approach with the IDS to deduct the intrusions. We used the Kyoto dataset to evaluate the performance of the proposed approach. The results show that the proposed approach have better accuracy of intrusion detection, high intrusion detection rate, and low false alarm rate than the existing approaches.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Ashfaq, R.A.R., Wang, X.Z., Huang, J.Z., Abbas, H., He, Y.L.: Fuzziness based semi-supervised learning approach for intrusion detection system. Inf. Sci. 378, 484–497 (2017)
Javaid, A., Niyaz, Q., Sun, W., Alam, M.: A deep learning approach for network intrusion detection system. In: Proceedings of 9th EAI International Conference on Bio-Inspired Information and Communications Technologies, pp. 21–26 (May 2016)
Ambusaidi, M.A., He, X., Nanda, P., Tan, Z.: Building an intrusion detection system using a filter-based feature selection algorithm. IEEE Trans. Comput. 65(10), 2986–2998 (2016)
Pan, S., Morris, T., Adhikari, U.: Developing a hybrid intrusion detection system using data mining for power systems. IEEE Trans. Smart Grid 6(6), 3104–3113 (2015)
Aljawarneh, S., Aldwairi, M., Yassein, M.B.: Anomaly-based intrusion detection system through feature selection analysis and building hybrid efficient model. J. Comput. Sci. 25, 152–160 (2018)
De la Hoz, E., De La Hoz, E., Ortiz, A., Ortega, J., Prieto, B.: PCA filtering and probabilistic SOM for network intrusion detection. Neurocomputing 164, 71–81 (2015)
Pajouh, H.H., Javidan, R., Khayami, R., Ali, D., Choo, K.K.R.: A two-layer dimension reduction and two-tier classification model for anomaly-based intrusion detection in IoT backbone networks. IEEE Trans. Emerg. Top. Comput. 7(2), 314–323 (2016)
Zhang, B., Liu, Z., Jia, Y., Ren, J., Zhao, X.: Network intrusion detection method based on PCA and Bayes algorithm. Secur. Commun. Netw. 2018, 1–11 (2018)
Jamei, M., Stewart, E., Peisert, S., Scaglione, A., McParland, C., Roberts, C., McEachern, A.: Micro synchrophasor-based intrusion detection in automated distribution systems: toward critical infrastructure security. IEEE Internet Comput. 20(5), 18–27 (2016)
Folino, G., Pisani, F.S., Sabatino, P.: A distributed intrusion detection framework based on evolved specialized ensembles of classifiers. In: European Conference on the Applications of Evolutionary Computation, pp. 315–331 (May 2016)
Jabbar, M.A., Aluvalu, R.: RFAODE: a novel ensemble intrusion detection system. Procedia Comput. Sci. 115, 226–234 (2017)
Jabbar, M.A., Aluvalu, R., Reddy, S.S.S.: Intrusion detection system using Bayesian network and feature subset selection. In: IEEE International Conference on Computational Intelligence and Computing Research, pp. 1–5 (December 2017)
Shakeri, A., Garrich, M., Bravalheri, A., Careglio, D., Solé-Pareta, J., Fumagalli, A.: Traffic allocation strategies in WSS-based dynamic optical networks. J. Opt. Commun. Netw. 9(4), B112–B123 (2017)
Kuang, F., Xu, W., Zhang, S.: A novel hybrid KPCA and SVM with GA model for intrusion detection. Appl. Soft Comput. 18, 178–184 (2014)
Reddy, R.R., Ramadevi, Y., Sunitha, K.V.N.: Effective discriminant function for intrusion detection using SVM. In: Proceedings of International Conference on Advances in Computing, Communications and Informatics (ICACCI), pp. 1148-1153 (2016)
Quinlan, R.: Induction of decision trees. Mach. Learn. 1(1), 81–106 (1986)
Quinlan, J.R.: C4.5: Programs for Machine Learning. Morgan Kaufmann, Burlington (1993)
Farnaaz, N., Jabbar, M.A.: Random forest modeling for network intrusion detection system. Procedia Comput. Sci. 89, 213–217 (2016)
Mukhrjee, S., et al.: Intrusion detection using Naïve Bayes classifier with feature reduction. Procedia Technol. 4, 119–128 (2012)
Bashah, N., et al.: Hybrid intelligent intrusion detection system. WASET 11, 23–26 (2005)
Ahmed, I., et al.: Feature subset selection for network intrusion detection mechanism using genetic eigen vectors. In: Proceedings of CSIT, vol. 5 (2011)
Song, J., Takakura, H., Okabe, Y., Eto, M., Inoue, D., Nakao, K.: Statistical analysis of honeypot data and building of Kyoto 2006+ dataset for NIDS evaluation. In: Proceedings of First Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, pp. 29–36 (April 2011)
Author information
Authors and Affiliations
Corresponding authors
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Meerja, A.J., Ashu, A., Rajani Kanth, A. (2021). Gaussian Naïve Bayes Based Intrusion Detection System. In: Abraham, A., Jabbar, M., Tiwari, S., Jesus, I. (eds) Proceedings of the 11th International Conference on Soft Computing and Pattern Recognition (SoCPaR 2019). SoCPaR 2019. Advances in Intelligent Systems and Computing, vol 1182. Springer, Cham. https://doi.org/10.1007/978-3-030-49345-5_16
Download citation
DOI: https://doi.org/10.1007/978-3-030-49345-5_16
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-49344-8
Online ISBN: 978-3-030-49345-5
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)