Open Access
Subscription Access
Open Access
Subscription Access
Improved Detection of Dos Attacks Using Intelligent Computation Techniques
Subscribe/Renew Journal
IDSs play a principal role in pro-actively detecting intrusions into enterprise-level computer networks, therefore the accuracy with which it performs this vital function is of paramount importance. Many studies have previously been conducted to improve upon proper classification of detections using neural networks and machine learning algorithms. We try to compare the performance of various intelligent computation techniques like Bayesian networks, Naive Bayesian, Logistic regression, RBF networks, Multi-Layer perception, SVMs with the SMO model, Kth nearest neighbour and Random forest in detecting DoS attack patterns. The data that was used to train and validate these techniques was obtained from the MIT Lincoln lab study into IDSs. The results obtained provide a clear comparison of the individual intelligent computation techniques ability in identifying and classifying attack patterns.
Keywords
Networks, Intrusion Detection, Denial of Service, Datasets, Data Mining, Bayesian Networks, Naive Bayesian, Logistic Regression, RBF Networks, Multi-layer Perception, Support Vector Machines, Sequential Minimal Optimization, Kth Nearest Neighbor, Random Forest
Subscription
Login to verify subscription
User
Font Size
Information
- Kruegal C., Valeur F., Vigna G., Kemmerer R., “Statefull intrusion detection for high speed networks”, In proceedings of IEEE Symposium on Security and Privacy, pp 285-294, May 2002
- Mukkamala S., and Sung. A. H. (2003) A Comparative Study of Techniques for Intrusion Detection. Proceedings of 15th IEEE International Conference on Tools with Artificial Intelligence, IEEE Computer Society Press, pp 570-579
- K. Park, and H. Lee, “On the Effectiveness of Router-Based Packet Filtering for Distributed DoS attack and Prevention in Power-Law Internets”, Proc. of the SGICOMM, pp. 15-26, 2001
- S. E. Webster, “The Development and Analysis of Intrusion Detection Algorithms”, S.M. Thesis, Massachusetts Institute of Technology, 1998
- K. Kendall, “A Database of Computer Attacks for the Evaluation of Intrusion Detection Systems”, Master's Thesis, Massachusetts Institute of Technology, 1998.
- “Internet Protocol Specification”, IETF, RFC 791, September 1981
- CERT Advisory CA-1998-01 Smurf IP Denial-of-Service Attacks http://www.cert.org/advisories/CA-1998-01.html, January 5, 1998
- Jason Anderson, “An Analysis of Fragmentation Attacks”, March 2001
- “Statistics: Methods and Applications”, Statsoft Publications
- Vladimir V. N. (1995) The Nature of Statistical Learning Theory. Springer
- Tommi Jaakkola, “Machine Learning: Bayesian networks, Support Vector Machines & Model selection”, MIT, 2006
- Jia Li, “Logistical Regression”, Department of Statistics, University of Pennsylvania, 2000~
- Ying So, “A Tutorial on Logisitc Regression”, SAS Institute, 2001
- [John Platt, “Fast training of support vector machines using sequential minimal optimization,” Advances in kernel methods: support vector learning, Pages: 185 – 208, 1999
- [Harp P.E., “Nearest neighbour pattern classification”. IEEE Transactions on Information Theory 13 (1): 21-27 (1967)
- Leo Breiman, “Random Forests”, Machine Learning, pp5-32, Kluwer Academic Publishing, 2001.
Abstract Views: 299
PDF Views: 4