Skip to main content

Combining Naive-Bayesian Classifier and Genetic Clustering for Effective Anomaly Based Intrusion Detection

  • Conference paper
Rough Sets, Fuzzy Sets, Data Mining and Granular Computing (RSFDGrC 2009)

Abstract

Network Intrusion detection systems have become unavoidable with the phenomenal rise in internet based security threats. Data mining technique based Intrusion Detection System, have the added advantage of processing large amount of data speedily. However, success rate is dependent on selecting the optimal set of features here. Given an optimal set of features and a good training data set, Bayesian classifier is known for its simplicity and high accuracy. On the other hand, clustering techniques have the flexibility to detect novel attacks even when training set is not present. Therefore, combining the results of both classification and clustering techniques can improve the performance of Intrusion Detection systems greatly. Our project aims at building flexible Intrusion Detection system by combining the advantages of Bayesian classifier and the genetic clustering algorithm. It was tested with KDD Cup 1999 dataset by supplying it with a good training set and a minimal one. In the first case, it produced excellent results, while in the second case it gave consistent performance.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Fries, T.P.: A fuzzy genetic approach for intrusion detection. In: Proceedings of the GECCO conference companion on Genetic and evolutionary computation, pp. 2141–2146 (2008)

    Google Scholar 

  2. Menzies, T., Allen, D., Orrego, A.: Bayesian Anomaly Detection. In: Workshop on Machine Learning Algorithms for Surveillance and Event detection at 23rd ICML, Pittsburgh (2006)

    Google Scholar 

  3. Park, H.-s., Lee, J.-s., Jun, C.-h.: A K-means-like Algorithm for K-medoids Clustering and Its Performance. In: Proceedings of the 36th CIE Conference on Computers and Industrial Engineering, pp. 1222–1223 (2006)

    Google Scholar 

  4. Singhi, S.K., Liu, H.: Feature Subset Selection Bias for Classification Learning. In: Proceedings of the 23rd International Conference on Machine Learning, Pittsburgh (2006)

    Google Scholar 

  5. Liu, Y., Chen, K., Liao, X., Zhang, W.: A Genetic Clustering Method for Intrusion Detection. Pattern Recognition 37(5), 927–942 (2004)

    Article  Google Scholar 

  6. Ertoz, L., Eilertson, E., Lazarevic, A., Tan, P.N., Kumar, V., Srivastava, J., Dokas, P.: MINDS - Minnesota Intrusion Detection System. In: Next Generation Data Mining. MIT Press, Cambridge (2004)

    Google Scholar 

  7. Portnoy, L., Esking, E., Stolfo, S.: Intrusion Detection with Unlabeled data using clustering. In: Proceedings of ACM CSS Workshop on Data Mining Applied to Security, DMSA 2001 (2001)

    Google Scholar 

  8. Domingos, P., Pazzani, M.: On the Optimality of the Simple Bayesian Classifier under Zero-One Loss. Machine Learning 29, 103–130 (1997)

    Article  MATH  Google Scholar 

  9. KDDCup 1999 Dataset (1999), http://kdd.ics.uci.edu/databases/kddcup99/kdd.html

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Thamaraiselvi, S., Srivathsan, R., Imayavendhan, J., Muthuregunathan, R., Siddharth, S. (2009). Combining Naive-Bayesian Classifier and Genetic Clustering for Effective Anomaly Based Intrusion Detection. In: Sakai, H., Chakraborty, M.K., Hassanien, A.E., Ślęzak, D., Zhu, W. (eds) Rough Sets, Fuzzy Sets, Data Mining and Granular Computing. RSFDGrC 2009. Lecture Notes in Computer Science(), vol 5908. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-10646-0_55

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-10646-0_55

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-10645-3

  • Online ISBN: 978-3-642-10646-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics