skip to main content
10.1145/3279996.3280032acmotherconferencesArticle/Chapter ViewAbstractPublication PagesdatasConference Proceedingsconference-collections
research-article

PAREEKSHA: a machine learning approach for intrusion and anomaly detection

Published: 01 October 2018 Publication History

Editorial Notes

NOTICE OF CONCERN: ACM has received evidence that casts doubt on the integrity of the peer review process for the DATA 2018 Conference. As a result, ACM is issuing a Notice of Concern for all papers published and strongly suggests that the papers from this Conference not be cited in the literature until ACM's investigation has concluded and final decisions have been made regarding the integrity of the peer review process for this Conference.

Abstract

Membership functions help us to identify and know the similarity between two elements such as vectors or sequences. The objective of this paper is to suggest a membership function and apply this membership function for learning the nature of dataset. In the initial learning process, the element vectors obtained are grouped to obtain clusters. The grouping is carried using incremental clustering technique. The initial knowledge thus build is later validated using the extended membership function so that any wrongly classified elements are placed properly. We name the approach as PAREEKSHA. The membership function is obtained by extending the basic Gaussian membership function and is inspired by approaches such as CLAPP, G-SPAMINE, and GARUDA in the recent research literature.

References

[1]
Debra Anderson, Teresa F. Lunt, Harold Javitz, Ann Tamaru, Alfonso Valdes, "Detecting Unusual Program Behavior Using the Statistical Component of the Next-generation Intrusion Detection Expert System (NIDES)", Computer Science Laboratory SRI-CSL-95-06, May 1995.
[2]
Shadi Aljawarneh, Monther Aldwairi, Muneer Bani Yassein, "Anomaly-based intrusion detection system through feature selection analysis and building hybrid efficient model", Journal of Computational Science, Volume 25, 2018, Pages 152--160, ISSN 1877-7503,
[3]
Asaf Shabtai, Robert Moskovitch, Clint Feher, Shlomi Dolev, Yuval Elovici, "Detecting unknown malicious code by applying classification techniques on OpCode patterns", Secur Inform (2012) 1: 1.
[4]
Evaluating Intrusion Detection Systems: The 1998 DARPA Off-line Intrusion Detection Evaluation.
[5]
D. Endler, "Intrusion detection. Applying machine learning to Solaris audit data," Proceedings 14th Annual Computer Security Applications Conference (Cat. No.98EX217), Phoenix, AZ, USA, 1998, pp. 268--279.
[6]
Wenke Lee, S. J. Stolfo and K. W. Mok, "A data mining framework for building intrusion detection models," Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344), Oakland, CA, USA, 1999, pp. 120--132.
[7]
Peter Mell, Vincent Hu," An Overview of Issues in Testing Intrusion Detection", NIST Interagency/Internal Report (NISTIR) - 7007, July 2003
[8]
Jacob W. Ulvila, John E. Gaffney, Jr., "Evaluation of Intrusion Detection Systems", Journal of Research of the National Institute of Standards and Technology, Volume 108, Number 6, November-December 2003.
[9]
Marius Kloft, Pavel Laskov, "Online Anomaly Detection under Adversarial Impact", Proceedings of the Thirteenth International Conference on Artificial Intelligence and Statistics, PMLR 9:405--412, 2010.
[10]
Z. Li, W. Sun and L. Wang, "A neural network based distributed intrusion detection system on cloud platform," 2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems, Hangzhou, 2012, pp. 75--79.
[11]
W. Yassin, N. I. Udzir, A. Abdullah, M. T. Abdullah, H. Zulzalil and Z. Muda, "Signature-Based Anomaly intrusion detection using Integrated data mining classifiers," 2014 International Symposium on Biometrics and Security Technologies (ISBAST), Kuala Lumpur, 2014, pp. 232--237.
[12]
Subudhi, Sharmila, Panigrahi, Suvasini, "A hybrid mobile call fraud detection model using optimized fuzzy C-means clustering and group method of data handling-based network", Vietnam Journal of Computer Science, 205 -- 217, VL - 5, IS - 3
[13]
Gunupudi Rajesh Kumar, Nimmala Mangathayaru, Gugulothu Narsimha, and Aravind Cheruvu. 2018. Feature Clustering for Anomaly Detection Using Improved Fuzzy Membership Function. In Proceedings of the Fourth International Conference on Engineering & MIS 2018 (ICEMIS '18). ACM, New York, NY, USA, Article 35, 9 pages.
[14]
Shadi Aljawarneh, V. Radhakrishna, and Aravind Cheruvu. 2018. VRKSHA: A Novel Multi-Tree Based Sequential Approach for Seasonal Pattern Mining. In Proceedings of the Fourth International Conference on Engineering & MIS 2018 (ICEMIS '18). ACM, New York, NY, USA, Article 37, 10 pages.
[15]
Classification for Intrusion Detection. In Proceedings of the 19th Annual Computer Security Applications Conference (ACSAC '03). IEEE Computer Society, Washington, DC, USA, 14-.
[16]
Gaffney J, Ulvila J. Evaluation of intrusion detectors: a decision theory approach. IEEE Symposium on Security and Privacy 2001:50--61
[17]
L. Portnoy, E. Eskin, S. Stolfo, Intrusion detection with unlabeled data using clustering, in: ACM CSS Workshop on Data Mining Applied to Security, 2001
[18]
A. Nagaraja, N. Mangathayaru, N. Rajashekar and T. S. Kumar, "A survey on routing techniques for transmission of packets in networks," 2016 International Conference on Engineering & MIS (ICEMIS), Agadir, 2016, pp. 1--6.
[19]
Roberto Perdisci, Davide Ariu, Prahlad Fogla, Giorgio Giacinto, Wenke Lee, McPAD: A multiple classifier system for accurate payload-based anomaly detection, Computer Networks, Volume 53, Issue 6, 2009, Pages 864--881, ISSN 1389--1286
[20]
E. Eskin, A. Arnold, M. Prerau, L. Portnoy, S. Stolfo, A geometric framework for unsupervised anomaly detection: detecting intrusions in unlabeled data, in: D. Barbara, S. Jajodia (Eds.), Applications of Data Mining in Computer Security, Kluwer, 2002.
[21]
C. Kruegel, T. Toth, E. Kirda, Service specific anomaly detection for network intrusion detection, in: ACM Symposium on Applied Computing (SAC), 2002.
[22]
Shadi A. Aljawarneh, Raja A. Moftah, Abdelsalam M. Maatuk, Investigations of automatic methods for detecting the polymorphic worms signatures, Future Generation Computer Systems, Volume 60, 2016, Pages 67--77, ISSN 0167-739X
[23]
Shadi Aljawarneh, A web engineering security methodology for e-learning systems, Network Security, Volume 2011, Issue 3, 2011, Pages 12--15, ISSN 1353--4858
[24]
Aljawarneh, S., Yassein, M.B. & Talafha, "A resource efficient encryption algorithm for multimedia big data", W.A. Multimed Tools Appl (2017) 76: 22703.
[25]
Shadi A. Aljawarneh, Ali Alawneh, Reem Jaradat, Cloud security engineering: Early stages of SDLC, Future Generation Computer Systems, Volume 74, 2017, Pages 385--392, ISSN 0167-739X
[26]
Gunupudi Rajesh Kumar, Mangathayaru Nimmala, G Narsimha, "A Novel Similarity Measure for Intrusion Detection using Gaussian Function", Technical Journal of the Faculty of Engineering, TJFE, Vol 39 (2), 2016, pp.173--183
[27]
Arun Nagaraja and T. Satish Kumar. 2018. A Membership Function for Feature Clustering Based Network Intrusion and Anomaly Detection. In Proceedings of the Fourth International Conference on Engineering & MIS 2018 (ICEMIS '18). ACM, New York, NY, USA, Article 22, 6 pages.
[28]
Arun Nagaraja and T. Satish Kumar. 2018. An Extensive Survey on Intrusion Detection- Past, Present, Future. In Proceedings of the Fourth International Conference on Engineering & MIS 2018 (ICEMIS '18). ACM, New York, NY, USA, Article 45, 9 pages.
[29]
Radhakrishna, V., Veereswara Kumar, P. & Janaki, V. Multimed Tools Appl (2017).
[30]
Radhakrishna, V., Aljawarneh, S.A., Veereswara Kumar, P. et al. Multimed Tools Appl (2017).
[31]
V. Radhakrishna, P. Kumar, V. Janaki, A Novel Similar Temporal System Call Pattern Mining for Efficient Intrusion Detection, Journal of Universal Computer Science, Vol 22(4): 475--493.
[32]
Gunupudi Rajesh Kumar, N. Mangathayaru, and G. Narasimha. 2015. Intrusion Detection Using Text Processing Techniques: A Recent Survey. In Proceedings of the International Conference on Engineering & MIS 2015 (ICEMIS '15). ACM, New York, NY, USA, Article 55, 6 pages.
[33]
Gunupudi Rajesh Kumar, N. Mangathayaru, and G. Narasimha. 2015. An approach for Intrusion Detection using Text Mining Techniques. In Proceedings of the International Conference on Engineering & MIS 2015 (ICEMIS '15). ACM, New York, NY, USA, Article 63, 6 pages.
[34]
Gunupudi Rajesh Kumar, N. Mangathayaru, and G. Narasimha. 2015. An improved k-Means Clustering algorithm for Intrusion Detection using Gaussian function. In Proceedings of the International Conference on Engineering & MIS 2015 (ICEMIS '15). ACM, New York, NY, USA, Article 69, 7 pages.
[35]
Aljawarneh, S.A. & Vangipuram, R. J Supercomput (2018).
[36]
G. R. Kumar, N. Mangathayaru and G. Narsimha, "Design of novel fuzzy distribution function for dimensionality reduction and intrusion detection," 2016 International Conference on Engineering & MIS (ICEMIS), Agadir, 2016, pp. 1--6.
[37]
G. R. Kumar, N. Mangathayaru, G. Narsimha and G. S. Reddy, "Evolutionary approach for intrusion detection," 2017 International Conference on Engineering & MIS (ICEMIS), Monastir, 2017, pp. 1--6.
[38]
N. Mangathayaru, G. R. Kumar and G. Narsimha, "Text mining based approach for intrusion detection," 2016 International Conference on Engineering & MIS (ICEMIS), Agadir, 2016, pp. 1--5.
[39]
G. R. Kumar, N. Mangathayaru and G. Narsimha, "An approach for intrusion detection using fuzzy feature clustering," 2016 International Conference on Engineering & MIS (ICEMIS), Agadir, 2016, pp. 1--8.
[40]
Rajesh Kumar Gunupudi, Mangathayaru Nimmala, Narsimha Gugulothu, Suresh Reddy Gali, CLAPP: A self constructing feature clustering approach for anomaly detection, Future Generation Computer Systems, Volume 74, 2017, Pages 417--429, ISSN 0167-739X.
[41]
Gunupudi Rajesh Kumar, Nimmala Mangathayaru, Gugulothu Narsimha, A Feature Clustering Based Dimensionality Reduction For Intrusion detection (FCBDR), IADIS International Journal on Computer Science & Information Systems. 2017, Vol. 12 Issue 1, p26--44. 19p.
[42]
Vangipuram Radhakrishna, P. V. Kumar, and V. Janaki. 2015. An Approach for Mining Similarity Profiled Temporal Association Patterns Using Gaussian Based Dissimilarity Measure. In Proceedings of the International Conference on Engineering & MIS 2015 (ICEMIS '15).
[43]
Shadi A. Aljawarneh, Radhakrishna Vangipuram, Veereswara Kumar Puligadda, and Janaki Vinjamuri. 2017. G-SPAMINE. Future Gener. Comput. Syst. 74, C (September 2017), 430--443.
[44]
Radhakrishna, V., Aljawarneh, S.A., Kumar, P.V. et al. Soft Comput (2018) 22: 1903.
[45]
Vangipuram Radhakrishna, Shadi A. Aljawarneh, P.V. Kumar, V. Janaki, A novel fuzzy similarity measure and prevalence estimation approach for similarity profiled temporal association pattern mining, Future Generation Computer Systems, 2017, ISSN 0167-739X
[46]
Radhakrishna V., Kumar P.V., Janaki V. (2017) A Computationally Efficient Approach for Mining Similar Temporal Patterns. In: Matoušek R. (eds) Recent Advances in Soft Computing. ICSC-MENDEL 2016. Advances in Intelligent Systems and Computing, vol 576. Springer, Cham
[47]
Radhakrishna V, Kumar PV, Janaki V (2017) Design and analysis of similarity measure for discovering similarity profiled temporal association patterns. IADIS International Journal on Computer Science and Information Systems 12(1):45--60.
[48]
Radhakrishna V, Kumar PV, Janaki V, Cheruvu A (2017) A dissimilarity measure for mining similar temporal association patterns. IADIS International Journal on Computer Science and Information Systems 12(1):126--142.
[49]
Radhakrishna V, Kumar PV, Janaki V (2017) Normal distribution based similarity profiled temporal association pattern mining (N-SPAMINE). Database Systems Journal 7(3):22--33
[50]
Aljawarneh S, Radhakrishna V, Kumar PV, Janaki V (2016) A similarity measure for temporal pattern discovery in time series data generated by IoT. 2016 International Conference on Engineering & MIS (ICEMIS), Agadir, pp 1--4.
[51]
Radhakrishna V, Kumar PV, Janaki V (2016) A computationally optimal approach for extracting similar temporal patterns. 2016 International Conference on Engineering & MIS (ICEMIS), Agadir, pp 1--6.
[52]
Radhakrishna V, Kumar PV, Janaki V, Aljawarneh S (2016) A similarity measure for outlier detection in timestamped temporal databases. 2016 International Conference on Engineering & MIS (ICEMIS), Agadir, pp 1--5.
[53]
Radhakrishna V, Kumar PV, Janaki V (2016) Looking into the possibility of novel dissimilarity measure to discover similarity profiled temporal association patterns in IoT. 2016 International Conference on Engineering & MIS (ICEMIS), Agadir, pp1--6.
[54]
Radhakrishna V, Kumar PV, Janaki V, Aljawarneh S (2016) A computationally efficient approach for temporal pattern mining in IoT. 2016 International Conference on Engineering & MIS (ICEMIS), Agadir, pp 1--4.
[55]
V. Radhakrishna, P. V. Kumar, S. A. Aljawarneh and V. Janaki, "Design and analysis of a novel temporal dissimilarity measure using Gaussian membership function," 2017 International Conference on Engineering & MIS (ICEMIS), Monastir, 2017, pp. 1--5.
[56]
V. Radhakrishna, S. A. Aljawarneh, V. Janaki and P. V. Kumar, "Looking into the possibility for designing normal distribution based dissimilarity measure to discover time profiled association patterns," 2017 International Conference on Engineering & MIS (ICEMIS), Monastir, 2017, pp. 1--5.
[57]
S. A. Aljawarneh, V. Radhakrishna and A. Cheruvu, "Extending the Gaussian membership function for finding similarity between temporal patterns," 2017 International Conference on Engineering & MIS (ICEMIS), Monastir, 2017, pp.1--6.
[58]
Y. C. Chen, W. C. Peng and S. Y. Lee, "Mining Temporal Patterns in Time Interval-Based Data," in IEEE Transactions on Knowledge and Data Engineering, vol. 27, no. 12, pp. 3318--3331, Dec.1, 2015
[59]
Vangipuram Radhakrishna, P. V. Kumar, and V. Janaki. 2018. Krishna Sudarsana: A Z-Space Similarity Measure. In Proceedings of the Fourth International Conference on Engineering & MIS 2018 (ICEMIS '18). ACM, New York, NY, USA, Article 44, 4 pages.
[60]
Porika Sammulal, Yelipe Usha Rani, Anurag Yepuri, A CLASS BASED CLUSTERING APPROACH FOR IMPUTATION AND MINING OF MEDICAL RECORDS (CBC-IM), IADIS International Journal on Computer Science & Information Systems, Vol 12, Issue 1, 2017.
[61]
UshaRani Yelipe, Sammulal Porika, Madhu Golla, An efficient approach for imputation and classification of medical data values using class-based clustering of medical records, Computers & Electrical Engineering, Volume 66, 2018, Pages 487--504, ISSN 0045-7906
[62]
UshaRani Y., Sammulal P. (2017) An Approach for Imputation of Medical Records Using Novel Similarity Measure. In: Matoušek R. (eds) Recent Advances in Soft Computing. ICSC-MENDEL 2016. Advances in Intelligent Systems and Computing, vol 576. Springer, Cham

Cited By

View all
  • (2023)Anomaly detection for maritime navigation based on probability density function of error of reconstructionJournal of Intelligent Systems10.1515/jisys-2022-027032:1Online publication date: 15-Nov-2023
  • (2022)Image Captioning Techniques: A Review2022 International Conference on Engineering & MIS (ICEMIS)10.1109/ICEMIS56295.2022.9914173(1-5)Online publication date: 4-Jul-2022
  • (2022)mHealth: A Secure Health Monitoring System for Diabetes2022 International Conference on Engineering & MIS (ICEMIS)10.1109/ICEMIS56295.2022.9914169(1-4)Online publication date: 4-Jul-2022
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
DATA '18: Proceedings of the First International Conference on Data Science, E-learning and Information Systems
October 2018
274 pages
ISBN:9781450365369
DOI:10.1145/3279996
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 October 2018

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. anomaly
  2. classification
  3. detection
  4. intrusion
  5. literature survey
  6. membership
  7. new approach for intrusion detection

Qualifiers

  • Research-article

Conference

DATA '18

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)6
  • Downloads (Last 6 weeks)0
Reflects downloads up to 20 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2023)Anomaly detection for maritime navigation based on probability density function of error of reconstructionJournal of Intelligent Systems10.1515/jisys-2022-027032:1Online publication date: 15-Nov-2023
  • (2022)Image Captioning Techniques: A Review2022 International Conference on Engineering & MIS (ICEMIS)10.1109/ICEMIS56295.2022.9914173(1-5)Online publication date: 4-Jul-2022
  • (2022)mHealth: A Secure Health Monitoring System for Diabetes2022 International Conference on Engineering & MIS (ICEMIS)10.1109/ICEMIS56295.2022.9914169(1-4)Online publication date: 4-Jul-2022
  • (2022)Service Quality in eLearning2022 International Conference on Engineering & MIS (ICEMIS)10.1109/ICEMIS56295.2022.9914135(1-5)Online publication date: 4-Jul-2022
  • (2021)Design and Analysis of activation functions used in deep learning modelsThe 7th International Conference on Engineering & MIS 202110.1145/3492547.3492575(1-5)Online publication date: 11-Oct-2021
  • (2021)Jordanian Higher Basic Stage Students’ uses of the Social Networking Site (Facebook) as a Mediator Assistant in Their LearningThe 7th International Conference on Engineering & MIS 202110.1145/3492547.3492574(1-5)Online publication date: 11-Oct-2021
  • (2021)Enhancing the Quality of the Arabic Content for Nursing on InternetThe 7th International Conference on Engineering & MIS 202110.1145/3492547.3492573(1-4)Online publication date: 11-Oct-2021
  • (2021)Acceptance of Blended learning Approach for Arab and European UniversitiesThe 7th International Conference on Engineering & MIS 202110.1145/3492547.3492572(1-4)Online publication date: 11-Oct-2021
  • (2021)Multiple Linear Regression Prediction Model for DDOS Attack Detection in Cloud ELBThe 7th International Conference on Engineering & MIS 202110.1145/3492547.3492567(1-9)Online publication date: 11-Oct-2021
  • (2021)Reviews of using solar energy to cover the energy deficit after the recent war in Mosul cityInternational Conference on Data Science, E-learning and Information Systems 202110.1145/3460620.3460766(254-265)Online publication date: 5-Apr-2021
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media