Fuzzy Rule-Based Layered Classifier and Entropy-Based Feature Selection for Intrusion Detection System

Fuzzy Rule-Based Layered Classifier and Entropy-Based Feature Selection for Intrusion Detection System

Devaraju Sellappan, Ramakrishnan Srinivasan
Copyright: © 2021 |Pages: 21
DOI: 10.4018/978-1-7998-5728-0.ch015
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

Intrusion detection systems must detect the vulnerability consistently in a network and also perform efficiently with the huge amount of traffic. Intrusion detection systems must be capable of detecting emerging and proactive threats in the networks. Various classifiers are used to classify the threats as normal or intrusive by supervising the system activity. In this chapter, layered fuzzy rule-based classifier is proposed to detect the various intrusions, and fuzzy entropy-based feature selection is proposed to identify the relevant features. Layered fuzzy rule-based classifier is proposed to improve the performance of the intrusion detection system. KDD dataset contains various attacks; these attacks are grouped into four classes, namely Denial-of-Service (DoS), Probe, Remote-to-Local (R2L), and User-to-Root (U2R). Real-time dataset is also considered in this research. Experimental result shows that the proposed method provides good detection rate, minimizes the false positive rate, and less computational time.
Chapter Preview
Top

Introduction

Recent scenario, most of the people have connected with internet for their specific purpose and other related purpose. So, the Intrusion Detection System (IDS) is important for any individual or organization to safeguard their information from unauthorised users. Organizaitons are using hardware and software devices to secure their information, eventually most of the intruders were not detected. Today the information is more important for any organization, so need to protect the information from unauthorised users because many unauthorised users are using different techniques to detect the information and exploit the systems are more vulnerabilities. Whenever the informations are transmit from one host to another host, which does not provide the protection from unauthorised users. In these aspects, Security is essential to protect the information.

Intrusion Detection Systems (IDS) are usually classified into two groups: Signature based and Anomaly based intrusion detection system. The signature based intrusion detection system detects the intrusion by comparing with its existing signatures in the log files. The anomaly based intrusion detection system which is observed from network when it behavior deviates from the normal attacks. Intrusion Detection System is classified as Network based intrusion detection system and Host based intrusion detection system. The network based intrusion detection system is a system which detect the misbehavior whenever the system can able to communicate with each other over the network. The host based intrusion detection system is a system which monitor and analyze the computer system if there is any misbehavior. (Devaraju & Ramakrishnan, 2013).

Fuzzy Rule-based technique is used to process the large volume of raw data easily. The various techniques are Association Rule, Clustering, Decision Trees, Neural Networks and Data Mining. The various authors have tried to improve the performance and reduce the false positive rate of intrusion detection system. Even though there are some misbehavior happening in intrusion detection system and could not be improve the performance and reduce the false positive rate due to the dataset contains large volume of data. The data contains many features and the authors were used all the features for processing but some features are not important.

In this paper, try to create a new set of fuzzy rulesets based on the protocol features which will help us to improve the performance, reduce the false positive rate and less processing time. There are three types of protocol feature are considered such as tcp, udp and icmp. Mainly attacks are depending on the any one of the protocol feature so need to category the data based on the protocol features to reduce the feature as well. The uniquenesses of the proposed paper are as follows:

  • i)

    Fuzzy entropy-based feature selection is proposed to select the most relevant features from KDD dataset.

  • ii)

    Fuzzy rule-based classifier is proposed to generate the new sets of fuzzy rules using selected features to classify the attacks by using KDD dataset and Real-time dataset.

  • iii)

    Layered classifier is proposed to get better the performance and less computational time.

The organization of the paper is as follows: Background of the related work, discusses fuzzy entropy-based feature selection and layered fuzzy rule-based classifier; describes experimental work of the proposed methods; and provides a conclusion.

Top

Background

Different techniques are used to detect the intrusion detection system. They are statistical methods, neural network, data mining etc. In this section, the various techniques used for intrusion detection systems are discussed.

Complete Chapter List

Search this Book:
Reset