A Network Intrusion Detection Method Using Dempster-shafer Theory

نویسنده

  • Ladislav Beránek
چکیده

An intrusion detection system (IDS) detects unauthorized manipulations of computer systems. Operation as feature reduction (including feature extraction and feature selection) plays an important role in the sense of improving classification performance and reducing the computational complexity of intrusion detection system. Feature reduction is even more important at online detection when less computational power and fast real time delivery compared with offline detection is needed. In this paper, Dempster Shafer theory based on KNN analysis approach [2] is applied to feature extraction in online network intrusion detection problem. We used the KDD Cup 99 [1] data and reduced its 41 features such that significant less number of features would be fed into this classifier. We used theoretical approach of Denoeux [2] which combines in his work Dempster Shafer theory [3] evidence coming from the k nearest neighbors of a test example (part of our data). Denoeux also addresses ambiguity and distance rejection, and uncertainty and imprecision in class labels [3]. We used this classifier and studied the performance of the Dempster-Shafer theory based KNN classifier used for intrusion detection system (KDD Cup 99 data). The whole paper is organized as follows: section 2 briefly describes the Dempster-Shafer theory of evidence and the KNN classifier based on this theory. In the next section, the data analysis methods including preprocessing and feature extraction techniques are described. In section 4, the voting KNN classifier, distance-weighted KNN classifier, and Dempster-Shafer KNN classifier are compared on an (KDD Cup 99 [1] data) and the conclusion is given in this paper. It has been shown that the Dempster-Shafer KNN classifier will result in higher classification accuracy in comparison with other two KNN classifiers. Thanks to its simplicity and performance, we are now looking forward to evaluating the performance of the real intrusion detection system (IDS) implemented on our university. We use MATLAB software for computation and visual exploration of data. This software is very suitable for these analyses considering its capability of data management and transformation tools ranging from graph procedures to a full-featured matrix algebra language. We present also the detail algorithms in MATLAB. Reference: [1] Kdd cup. the third international knowledge discovery and data mining tools competition. http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html. [2] T. Denoeux, “A k-nearest neighbor classification rule based on Dempster-Shafer theory,” IEEE Trans. Syst. Man Cybern., vol. 25, no. 5, pp. 804–813, 1995. [3] G. Shafer, A mathematical theory of evidence. Princeton university press Princeton, NJ, 1976. Contact information: Department of Applied Mathematics and Informatics, Faculty of Economics, University of South Bohemia in Ceske Budejovice, Studentska 13, 370 05 Ceske Budejovice, Czech Republic, e-mail: [email protected]

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

REGION MERGING STRATEGY FOR BRAIN MRI SEGMENTATION USING DEMPSTER-SHAFER THEORY

Detection of brain tissues using magnetic resonance imaging (MRI) is an active and challenging research area in computational neuroscience. Brain MRI artifacts lead to an uncertainty in pixel values. Therefore, brain MRI segmentation is a complicated concern which is tackled by a novel data fusion approach. The proposed algorithm has two main steps. In the first step the brain MRI is divided to...

متن کامل

A Cloud Intrusion Detection System Using Novel PRFCM Clustering and KNN Based Dempster-Shafer Rule

Cloud computing has established a new horizon in the field of Information Technology. Due to the large number of users and extensive utilization, the Cloud computing paradigm attracts intruders who exploit its vulnerabilities. To secure the Cloud environment from such intruders an Intrusion Detection System (IDS) is required. In this paper the authors have proposed an anomaly based IDS which cl...

متن کامل

محاسبه فاصله عدم قطعیت بر پایه آنتروپی شانون و تئوری دمپستر-شافر از شواهد

Abstract Dempster Shafer theory is the most important method of reviewing uncertainty for information system. This theory as introduced by Dempster using the concept of upper and lower probabilities extended later by Shafer. Another important application of entropy as a basic concept in the information theory  can be used as a uncertainty measurement of the system in specific situation In th...

متن کامل

Generalized Evidential Processing in Multiple Simultaneous Threat Detection in UNIX

In this paper, a hybrid identity fusion model at decision level is proposed for Simultaneous Threat Detection Systems. The hybrid model is comprised of mathematical and statistical data fusion engines; Dempster Shafer, Extended Dempster and Generalized Evidential Processing (GEP). Simultaneous Threat Detection Systems improve threat detection rate by 39%. In terms of efficiency and performance,...

متن کامل

A Sensor-Based Scheme for Activity Recognition in Smart Homes using Dempster-Shafer Theory of Evidence

This paper proposes a scheme for activity recognition in sensor based smart homes using Dempster-Shafer theory of evidence. In this work, opinion owners and their belief masses are constructed from sensors and employed in a single-layered inference architecture. The belief masses are calculated using beta probability distribution function. The frames of opinion owners are derived automatically ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2009