Intrusion Detection using Sequential Hybrid Model

10/26/2019
by   Aditya Pandey, et al.
0

A large amount of work has been done on the KDD 99 dataset, most of which includes the use of a hybrid anomaly and misuse detection model done in parallel with each other. In order to further classify the intrusions, our approach to network intrusion detection includes use of two different anomaly detection models followed by misuse detection applied on the combined output obtained from the previous step. The end goal of this is to verify the anomalies detected by the anomaly detection algorithm and clarify whether they are actually intrusions or random outliers from the trained normal (and thus to try and reduce the number of false positives). We aim to detect a pattern in this novel intrusion technique itself, and not the handling of such intrusions. The intrusions were detected to a very high degree of accuracy.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
09/12/2020

Machine Learning Applications in Misuse and Anomaly Detection

Machine learning and data mining algorithms play important roles in desi...
research
06/22/2021

Anomaly-based Intrusion Detection System Using Fuzzy Logic

Recently, the Distributed Denial of Service (DDOS) attacks has been used...
research
02/14/2022

AnoMili: Spoofing Prevention and Explainable Anomaly Detection for the 1553 Military Avionic Bus

MIL-STD-1553, a standard that defines a communication bus for interconne...
research
08/22/2023

Performance Comparison and Implementation of Bayesian Variants for Network Intrusion Detection

Bayesian classifiers perform well when each of the features is completel...
research
11/25/2019

Host-based anomaly detection using Eigentraces feature extraction and one-class classification on system call trace data

This paper proposes a methodology for host-based anomaly detection using...
research
06/02/2023

A Hybrid Approach for Smart Alert Generation

Anomaly detection is an important task in network management. However, d...
research
04/14/2019

Should I Raise The Red Flag? A comprehensive survey of anomaly scoring methods toward mitigating false alarms

A general Intrusion Detection System (IDS) fundamentally acts based on a...

Please sign up or login with your details

Forgot password? Click here to reset