Skip to main content

Incremental Hybrid Intrusion Detection Using Ensemble of Weak Classifiers

  • Conference paper
Advances in Computer Science and Engineering (CSICC 2008)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 6))

Included in the following conference series:

Abstract

In this paper, an incremental hybrid intrusion detection system is introduced. This system combines incremental misuse detection and incremental anomaly detection. It can learn new classes of intrusions that do not exist in the training dataset for incremental misuse detection. As the framework has low computational complexity, it is suitable for real-time or on-line learning. Also experimental evaluations on KDD Cup dataset are presented.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Mounji, A., Charlier, B.L., Zampuniéris, D., Habra, N.: Distributed audit trail analysis. In: Balenson, D., Shirey, R. (eds.) Proceedings of the ISOC 1995 symposium on network and distributed system security, pp. 102–112. IEEE Computer Society, Los Alamitos (1995)

    Google Scholar 

  2. Lindqvist, U., Porras, P.A.: Detecting computer and network misuse through the production-based expert system toolset (PBEST). In: Gong, L., Reiter, M. (eds.) Proceedings of the 1999 IEEE symposium on security and privacy, pp. 146–161. IEEE Computer Socitey, Los Alamitos (1999)

    Google Scholar 

  3. Ilgun, K., Kemmerer, R.A., Porras, P.A.: State transition analysis: A rule-based intrusion detection approach. IEEE Transactions on Software Engineering 21(3), 181–199 (1995)

    Article  Google Scholar 

  4. Neri, F.: Comparing local search with respect to genetic evolution to detect intrusions in computer networks. In: Proceedings of the 2000 Congress on Evolutionary Computation, Mar-seille, France, July 2000, vol. 1, pp. 238–243. IEEE, Los Alamitos (2000)

    Google Scholar 

  5. Guan, J., Liu, D.X., Cui, B.G.: An induction learning approach for building intrusion detection models using genetic algorithms. In: Proceedings of Fifth World Congress on Intelligent Control and Automation WCICA, vol. 5, pp. 4339–4342. IEEE, Los Alamitos (2004)

    Google Scholar 

  6. Kruegel, C., Toth, T., Kirda, E.: Service specific anomaly detection for network intrusion detection. In: Proceedings of the 2002 ACM symposium on Applied computing, pp. 201–208. ACM Press, New York (2002)

    Chapter  Google Scholar 

  7. Freund, Y., Schapire, R.: A decision theoretic generalization of on-line learning and an application to boosting. Comput. Syst. Sci. 57(1), 119–139 (1997)

    Article  MathSciNet  MATH  Google Scholar 

  8. Xu, L., Krzyzak, A., Suen, C.Y.: Methods of Combining Multiple Classifier and Their Application to Handwriting Recognition. IEEE transactions on systems, man and cybernetics 22(3) (May/June 1992)

    Google Scholar 

  9. Barbarra, D., Couto, J., Jajodia, S., Popyack, L., Wu, N.: ADAM: Detecting Intrusion by Data Mining. In: Proceedings of the 2001 IEEE, Workshop on Information Assurance and Security T1A3 1100 United States Military Academy, West Point, NY (June 2001)

    Google Scholar 

  10. Anderson, D., Frivold, T., Valdes, A.: Next-Generation Intrusion Detection Expert System (NIDES)-A Summary, Technical Report SRICLS-95-07, SRI (May 1995)

    Google Scholar 

  11. Zhang, J., Zulkernine, M.: A Hybrid Network Intrusion Detection Technique Using Random Forests. In: Proc. of the International Conference on Availability, Reliability and Security (AReS), Vienna, Austria, April 2006, pp. 262–269. IEEE Computer Soceity Press, Los Alamitos (2006)

    Google Scholar 

  12. Locasto, M., Wang, K., Keromytis, A., Stolfo, S.: Flips: Hybrid adaptive intrusion prevention. In: Valdes, A., Zamboni, D. (eds.) RAID 2005. LNCS, vol. 3858, pp. 82–101. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  13. Porras, P.A., Neumann, P.G.: EMERALD: Event Monitoring Enabling Responses to Anomalous Live Disturbances. In: Proceedings of 20th National Information Systems Security Conference (1997)

    Google Scholar 

  14. Tombini, E., Debar, H., Mé, L., Ducassé, M.: A Serial Combination of Anomaly and Misuse IDSes Applied to HTTP Traffic. In: Proceedings of the Annual Computer Security Applications Conference (ACSAC) (December 2004)

    Google Scholar 

  15. Depren, O., Topallar, M., Anarim, E., Ciliz, M.K.: An intelligent intrusion detection system (IDS) for anomaly and misuse detection in computer networks. Expert Systems with Applications 29(4), 713–722 (2005); Elsevier

    Article  Google Scholar 

  16. Hwang, K., Cai, M., Chen, Y., Qin, M.: Hybrid Intrusion Detection with Weighted Signature Generation over Anomalous Internet Episodes. IEEE Transaction on Dependable and Secure Computing 4(1), 41–55 (2007)

    Article  Google Scholar 

  17. Xiang, C., Lim, S.M.: Design of Multiple-Level Hybrid Classifier for Intrusion Detection System. In: Proceeding of Machine Learning for Signal Processing, 2005 IEEE Workshop, pp. 117–122, September 28 (2005)

    Google Scholar 

  18. Rasoulifard, A., Ghaemi Bafghi, A.: Incremental Intrusion Detection Using Learn++ algorithm. In: 3rd conference on Information and Knowledge Technology, IKT2007, Ferdowsi University of Mashhad, Faculty of Engineering, November 27-29 (2007)

    Google Scholar 

  19. Yang, W., Yun, X.-C., Zhang, L.-J.: Using Incremental Learning Method From Adaptive Network Intrusion Detection. In: Proceedings of the Fourth International Conference on Machine Learnining and Cybernetics, Guanbzhou, August 18-21 (2005)

    Google Scholar 

  20. Zhong, S., Khoshgoftaar, T., Seliya, N.: Clustering-Based Network Intrusion Detection. International Journal of Reliability, Quality and Safety Engineering

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2008 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Rasoulifard, A., Ghaemi Bafghi, A., Kahani, M. (2008). Incremental Hybrid Intrusion Detection Using Ensemble of Weak Classifiers. In: Sarbazi-Azad, H., Parhami, B., Miremadi, SG., Hessabi, S. (eds) Advances in Computer Science and Engineering. CSICC 2008. Communications in Computer and Information Science, vol 6. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-89985-3_71

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-89985-3_71

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-89984-6

  • Online ISBN: 978-3-540-89985-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics