Skip to main content

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 1182))

Included in the following conference series:

Abstract

Intrusion detection system (IDS) is used to monitor the intrusions or suspicious actions over the network traffic data or in the computer system. In this paper, we propose an IDS for identifying the intrusion over the network traffic data. As the network traffic data are continuous in nature, we used the Gaussian Naïve Bayes classification approach with the IDS to deduct the intrusions. We used the Kyoto dataset to evaluate the performance of the proposed approach. The results show that the proposed approach have better accuracy of intrusion detection, high intrusion detection rate, and low false alarm rate than the existing approaches.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Ashfaq, R.A.R., Wang, X.Z., Huang, J.Z., Abbas, H., He, Y.L.: Fuzziness based semi-supervised learning approach for intrusion detection system. Inf. Sci. 378, 484–497 (2017)

    Article  Google Scholar 

  2. Javaid, A., Niyaz, Q., Sun, W., Alam, M.: A deep learning approach for network intrusion detection system. In: Proceedings of 9th EAI International Conference on Bio-Inspired Information and Communications Technologies, pp. 21–26 (May 2016)

    Google Scholar 

  3. Ambusaidi, M.A., He, X., Nanda, P., Tan, Z.: Building an intrusion detection system using a filter-based feature selection algorithm. IEEE Trans. Comput. 65(10), 2986–2998 (2016)

    Article  MathSciNet  MATH  Google Scholar 

  4. Pan, S., Morris, T., Adhikari, U.: Developing a hybrid intrusion detection system using data mining for power systems. IEEE Trans. Smart Grid 6(6), 3104–3113 (2015)

    Article  Google Scholar 

  5. Aljawarneh, S., Aldwairi, M., Yassein, M.B.: Anomaly-based intrusion detection system through feature selection analysis and building hybrid efficient model. J. Comput. Sci. 25, 152–160 (2018)

    Article  Google Scholar 

  6. De la Hoz, E., De La Hoz, E., Ortiz, A., Ortega, J., Prieto, B.: PCA filtering and probabilistic SOM for network intrusion detection. Neurocomputing 164, 71–81 (2015)

    Article  Google Scholar 

  7. Pajouh, H.H., Javidan, R., Khayami, R., Ali, D., Choo, K.K.R.: A two-layer dimension reduction and two-tier classification model for anomaly-based intrusion detection in IoT backbone networks. IEEE Trans. Emerg. Top. Comput. 7(2), 314–323 (2016)

    Article  Google Scholar 

  8. Zhang, B., Liu, Z., Jia, Y., Ren, J., Zhao, X.: Network intrusion detection method based on PCA and Bayes algorithm. Secur. Commun. Netw. 2018, 1–11 (2018)

    Google Scholar 

  9. Jamei, M., Stewart, E., Peisert, S., Scaglione, A., McParland, C., Roberts, C., McEachern, A.: Micro synchrophasor-based intrusion detection in automated distribution systems: toward critical infrastructure security. IEEE Internet Comput. 20(5), 18–27 (2016)

    Article  Google Scholar 

  10. Folino, G., Pisani, F.S., Sabatino, P.: A distributed intrusion detection framework based on evolved specialized ensembles of classifiers. In: European Conference on the Applications of Evolutionary Computation, pp. 315–331 (May 2016)

    Google Scholar 

  11. Jabbar, M.A., Aluvalu, R.: RFAODE: a novel ensemble intrusion detection system. Procedia Comput. Sci. 115, 226–234 (2017)

    Article  Google Scholar 

  12. Jabbar, M.A., Aluvalu, R., Reddy, S.S.S.: Intrusion detection system using Bayesian network and feature subset selection. In: IEEE International Conference on Computational Intelligence and Computing Research, pp. 1–5 (December 2017)

    Google Scholar 

  13. Shakeri, A., Garrich, M., Bravalheri, A., Careglio, D., Solé-Pareta, J., Fumagalli, A.: Traffic allocation strategies in WSS-based dynamic optical networks. J. Opt. Commun. Netw. 9(4), B112–B123 (2017)

    Article  Google Scholar 

  14. Kuang, F., Xu, W., Zhang, S.: A novel hybrid KPCA and SVM with GA model for intrusion detection. Appl. Soft Comput. 18, 178–184 (2014)

    Article  Google Scholar 

  15. Reddy, R.R., Ramadevi, Y., Sunitha, K.V.N.: Effective discriminant function for intrusion detection using SVM. In: Proceedings of International Conference on Advances in Computing, Communications and Informatics (ICACCI), pp. 1148-1153 (2016)

    Google Scholar 

  16. Quinlan, R.: Induction of decision trees. Mach. Learn. 1(1), 81–106 (1986)

    Google Scholar 

  17. Quinlan, J.R.: C4.5: Programs for Machine Learning. Morgan Kaufmann, Burlington (1993)

    Google Scholar 

  18. Farnaaz, N., Jabbar, M.A.: Random forest modeling for network intrusion detection system. Procedia Comput. Sci. 89, 213–217 (2016)

    Article  Google Scholar 

  19. Mukhrjee, S., et al.: Intrusion detection using Naïve Bayes classifier with feature reduction. Procedia Technol. 4, 119–128 (2012)

    Article  Google Scholar 

  20. Bashah, N., et al.: Hybrid intelligent intrusion detection system. WASET 11, 23–26 (2005)

    Google Scholar 

  21. Ahmed, I., et al.: Feature subset selection for network intrusion detection mechanism using genetic eigen vectors. In: Proceedings of CSIT, vol. 5 (2011)

    Google Scholar 

  22. Song, J., Takakura, H., Okabe, Y., Eto, M., Inoue, D., Nakao, K.: Statistical analysis of honeypot data and building of Kyoto 2006+ dataset for NIDS evaluation. In: Proceedings of First Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, pp. 29–36 (April 2011)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Akhil Jabbar Meerja , A. Ashu or Aluvalu Rajani Kanth .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Meerja, A.J., Ashu, A., Rajani Kanth, A. (2021). Gaussian Naïve Bayes Based Intrusion Detection System. In: Abraham, A., Jabbar, M., Tiwari, S., Jesus, I. (eds) Proceedings of the 11th International Conference on Soft Computing and Pattern Recognition (SoCPaR 2019). SoCPaR 2019. Advances in Intelligent Systems and Computing, vol 1182. Springer, Cham. https://doi.org/10.1007/978-3-030-49345-5_16

Download citation

Publish with us

Policies and ethics