Implementation of Intelligent Multi-Layer Intrusion Detection Systems (IMLIDS)

نویسندگان

  • Sherif M. Badr
  • Asmaa Shaker Ashoor
  • Abd El Fatah Hegazy
  • Z. S. Pan
  • S. C. Chen
  • G. B Hu
  • D. Q. Zhang
  • Murat Topallar
چکیده

Intrusion Detection System (IDS) has increasingly become a crucial issue for computer and network systems. Optimizing performance of IDS becomes an important open problem which receives more and more attention from the research community. This paper, design and develop a proposed multi-layer intrusion detection model to achieve high efficiency and improve the detection and classification rate accuracy. Also the proposed model was improved the detection rate for known and unknown attacks by training the hybrid model on the known intrusion data. Then the model applied for unknown attacks by introducing new types of attacks that are never seen by the training module. The experimental results showed that the proposed multi-layer model using C5 decision tree achieves higher classification rate accuracy, and less false alarm rate

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Towards a new approach for intrusion detection with intelligent agents

In this paper, we focus on one critical issue in security management that is intrusion detection. Intrusion detection requirements and concepts are reviewed. Some existing systems are described. Their advantages and limitations are illustrated. Drawbacks of existing intrusion detection systems involve the necessity of designing a new generation of self-adaptive systems. In fact, mainly, self-co...

متن کامل

A New Intrusion Detection System to deal with Black Hole Attacks in Mobile Ad Hoc Networks

By extending wireless networks and because of their different nature, some attacks appear in these networks which did not exist in wired networks. Security is a serious challenge for actual implementation in wireless networks. Due to lack of the fixed infrastructure and also because of security holes in routing protocols in mobile ad hoc networks, these networks are not protected against attack...

متن کامل

Designing an Intelligent Intrusion Detection System in the Electronic Banking Industry Using Fuzzy Logic

One of the most important obstacles to using Internet banking is the lack of Stability of transactions and some misuse in the course of transactions it is financial. That is why preventing unauthorized access Crime detection is one of the major issues in financial institutions and banks. In this article, a system of intelligence has been designed that recognizes Suspicious and unusual behaviors...

متن کامل

Network security management with intelligent agents

Multi-Agent Systems technology can be useful for efficiently designing and maintaining secure networks. Indeed, networks evolve at a rapid pace in terms of the number and type of components and user access queries as well as intrusion possibilities. Features such as autonomy, adaptability and flexibility of the “intelligent” agent paradigm allow managing network evolution in a controlled way. T...

متن کامل

Distributed Intrusion Detection Systems: a Computational Intelligence Approach

Computer security is defined as the protection of computing systems against threats to confidentiality, integrity, and availability. An intrusion is defined as any set of actions that attempt to compromise the integrity, confidentiality or availability of a resource. The process of monitoring the events occurring in a computer system or network and analyzing them for sign of intrusions is known...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013