Skip to main content

Advertisement

Log in

Detection of data integrity attacks by constructing an effective intrusion detection system

  • Original Research
  • Published:
Journal of Ambient Intelligence and Humanized Computing Aims and scope Submit manuscript

    We’re sorry, something doesn't seem to be working properly.

    Please try refreshing the page. If that doesn't work, please contact support so we can address the problem.

Abstract

Network users are heavily targeted by data integrity attacks that affect the development of new security techniques. The main challenge in network security is to identify this kind of attack for the improvement of growing mechanisms. In this paper, a data integrity based effective intrusion detection system (DI-EIDS) is constructed to prevent the network with a high detection rate and low false alarm rates. It is classified into two phases; data sampling and selection of features. In the data sampling process, attacks are detected and inference based on the sample signatures. In this process, the Deviation forest (d-forest) is used to remove barriers; Grey Wolf Optimization (GWO) is used for sampling ratio optimization and Black forest (BF) classifier to obtain the best training data. To select the best features, GWO and BF are repeatedly used. Finally, DI-EIDS based on the black forest is constructed using the best training data set obtained by data sampling and feature selection. Rare Integrity attacks are detected in this technique when compared with other algorithms. Experimental results are analyzed using different datasets with a 22% sampling rate. The performance results show a higher rate of detection with low false-positive rates.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4

Similar content being viewed by others

Explore related subjects

Discover the latest articles, news and stories from top researchers in related subjects.

Availability of data and materials

Data sharing not applicable to this article as no datasets were generated or analysed during the current study.

References

  • Al-Yaseen Z, Othman A, Nazri MZ (2015) Intrusion detection system based on modified k-means and multi-level support vector machines. In: Proceedings of the international conference on soft computing in data science proceedings, vol 545, pp 265–274

  • Al-Yaseen WL, Othman ZA, Nazri MZA (2015b) Hybrid modified k-means with c4.5 for intrusion detection systems in multiagent systems. Sci World J 2015:14

    Google Scholar 

  • Al-Yaseen WL, Ali Othman Z, Ahmad Nazri MZ (2017) Multi-level hybrid support vector machine and extreme learning machine based on modified K-means for intrusion detection system. Expert Syst Appl 67:296–303

    Article  Google Scholar 

  • Chen X, Zhang F, Susilo W, Tian H, Li J, Kim K (2014) Identity-based chameleon hashing and signatures without key exposure. Inf Sci 265:198–210

    Article  Google Scholar 

  • Faris H, Al-Zoubi AM, Heidari AA (2018) An intelligent system for spam detection and identification of the most relevant features based on evolutionary Random Weight Networks. Inf Fus 48:67–83

    Article  Google Scholar 

  • Gauthama Raman MR, Somu N, Jagarapu S (2019) An efficient intrusion detection technique based on support vector machine and improved binary gravitational search algorithm. Artif Intell Rev. https://doi.org/10.1007/s10462-019-09762-z

    Article  Google Scholar 

  • George A (2012) Anomaly detection based on machine learning dimensionality reduction using PCA and classification using SVM. Int J Comput Appl 47:5–8

    Google Scholar 

  • Hajisalem V, Babaie S (2018) A hybrid intrusion detection system based on ABC-AFS algorithm for misuse and anomaly detection. Comput Netw 136:37–50

    Article  Google Scholar 

  • Hamamoto AH, Carvalho LF, Sampaio LDH, Abrao T, Proencia ML (2017) Network anomaly detection system using genetic algorithm and fuzzy logic. Expert Syst Appl 67:390–402

    Google Scholar 

  • Khammassi C, Krichen S (2017) A GA-LR wrapper approach for feature selection in network intrusion detection. Comput Secur 70:255–277

    Article  Google Scholar 

  • Koc L, Mazzuchi TA, Sarkani S (2012) A network intrusion detection system based on a Hidden Naive Bayes multiclass classifier. Expert Syst Appl 18(39):13492–13500

    Article  Google Scholar 

  • Lee W, Zhen L, et al. (2017) Hin2vec: Explore metapaths in heterogeneous information networks for representation learning. In: ACM conference on information and knowledge management, pp 1797–1806

  • Ma J, Sun L, Wang H, Zhang Y, Aickelin U (2016) Supervised anomaly detection in uncertain sensor data streams. ACM Trans Internet Technol 16:20

    Article  Google Scholar 

  • Sasan P, Sharma M (2016) Intrusion detection using feature selection and machine learning algorithm with misuse detection. Int J Comput Sci Inf Technol 8:17–25

    Google Scholar 

  • Vijayanand R, Devaraj D, Kannapiran B (2018) Intrusion detection system for wireless mesh network using multiple support vector machine classifiers with genetic-algorithm-based feature selection. Comput Secur 77:304–314

    Article  Google Scholar 

  • Wang D, Zhang Z, Wang P, Yan J, Huang X (2016) Targeted online password guessing: an underestimated threat. In: ACM conference on computer and communications security, pp 1242–1254

  • Wang H, Gu J, Wang S (2017) An effective intrusion detection framework based on SVM with feature augmentation. Knowl-Based Syst 136:130–139

    Article  Google Scholar 

  • Zhang J, Peng M, Wang H, Cao J, Wang G, Zhang X (2016a) A probabilistic method for emerging topic tracking in microblog stream. World Wide Web 20:1–26

    Google Scholar 

  • Zhang Y, Shen Y, Wang H, Yong J, Jiang X (2016b) On secure wireless communications for IoT under eavesdropper collusion. IEEE Trans Autom Sci Eng 13:1281–1293

    Article  Google Scholar 

Download references

Acknowledgment

This research work has been confidentially acknowledged by Anna University recognized research center lab at V V College of Engineering, Tisaiyanvilai, India.

Funding

No funding source has been acknowledged.

Author information

Authors and Affiliations

Authors

Contributions

R.B.Benisha has published two SCI journals four International conference papers and one International journal paper. Dr.S.Raja Ratna has published Four SCI journals and five Scopus indexed journals. Her research interests include denial-of-service attacks, jamming attacks, secure routing algorithm and security in networks.

Corresponding author

Correspondence to R. B. Benisha.

Ethics declarations

Conflict of interest

R. B. Benisha and Dr. S. Raja Ratna declares that they have no Competing interests.

Animal rights

This article does not contain any studies with animal subjects performed by the any of the authors.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Benisha, R.B., Ratna, S.R. Detection of data integrity attacks by constructing an effective intrusion detection system. J Ambient Intell Human Comput 11, 5233–5244 (2020). https://doi.org/10.1007/s12652-020-01850-1

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12652-020-01850-1

Keywords