The International Arab Journal of Information Technology (IAJIT)

..............................
..............................
..............................


Design and Development of Suginer Filter for Intrusion Detection Using Real Time Network Data

By rapid use of the Internet and computer network all over the world makes security a major issues, so using the intrusion-detection system has become more important. All the same, the primary issues of Intrusion-Detection System (IDS) are generating high false alarm rate and fails to detect attacks, which make system security more vulnerable. This paper proposed a new concept of using Suginer Filter to identify IDS. The Takagi-Sugeno fuzzy model is structured based on Neuro- fuzzy method to generate fuzzy rules and wiener filter is used to filter out attack as a noise signal using fuzzy rule generation. These two methods are combined to detect intrusive behavior of the system. The proposed suginer filter (Sugeno+Wiener) uses completely a different research structure to identify attacks and the experiment was evaluated on live network data collected, which shows that the proposed system achieves approximately 98.46% of accuracy and reduce false alarm rate to 0.08% in detecting different real time attacks. From the obtained result it’s clear that the proposed system performs better when compared with other existing machine learning techniques.


[1] Al-Kasassbeh M., Network Intrusion Detection with Wiener Filter-Based Agent, World Applied Sciences, vol. 13, no. 11, pp. 2372-2384, 2011.

[2] Axelsson S., Research in intrusion-detection systems: A survey, Technical Report, 1998.

[3] Brindha P. and Senthilkumar A., Network Intrusion Detection System: An Improved Architecture to Reduce False Positive Rate, Journal of Theoretical and Applied Information Technology, vol. 66, no. 1, pp. 618-626, 2014.

[4] Celenk M., Conley T., Graham J., and Willis J., Anomaly Prediction in Network Traffic using Adaptive Wiener Filtering and ARMA Modeling, in Proceedings of IEEE International Conference Systems, Man and Cybernetics, Singapore, pp. 3548-3553, 2008.

[5] Depren O., Topallar M., Anarim E., and Ciliz M., An Intelligent Intrusion Detection System for Anomaly Misuse detection in Computer Networks, Expert Systems with Applications, vol. 29, no. 4, pp. 713-722, 2005.

[6] Elhag S., Fern ndez A., Bawakid A., Alshomrani S., and Herrera F., On the Combination of Genetic Fuzzy Systems and Pairwise Learning for Improving Detection Rates on Intrusion Detection Systems, Expert Systems with Applications, vol. 42, no. 1, pp. 193-202, 2015.

[7] Full er R., Introduction to Neuro-Fuzzy Systems, Springer, 1999.

[8] Hoang X., Hu J., and Bertok P., A Program- Based Anomaly Intrusion Detection Scheme using Multiple Detection Engines and Fuzzy (10) (11) 100*tan)(ceinsofnumberTotal attacksclassifiedcorrectlyofnumberTotalDR 100*tan tan)(ceinsofnumberTotal ceinsiedmisclassifofnumberTotalFAR 638 The International Arab Journal of Information Technology, Vol. 15, No. 4, July 2018 Inference, Journal of Network and Computer Applications, vol. 32, no. 6, pp. 1219-1228, 2009.

[9] Jang J., ANFIS Adaptive-Network-Based Fuzzy Inference System, IEEE Systems, Man, and Cybernetics Society, vol. 23, no. 3, pp. 665-685, 1993.

[10] Kim M. and Lee D., Data-Mining Based SQL Injection Attack Detection using Internal Query Trees, Expert Systems with Applications, vol. 41, no. 11, pp. 5416-5430, 2014.

[11] Luo B. and Xia J., A Novel Intrusion Detection System Based on Feature Generation with Visualization Strategy, Expert Systems with Applications, vol. 41, no. 9, pp. 4139-4147, 2014.

[12] Lu W., Tavallaee M., Bagheri E., and Ghorbani A., A Detailed Analysis of the KDD CUP 99 Data Set, in the Proceeding Of the IEEE Symposium on Computational Intelligence in Security and Defense Applications, Ottawa, pp. 1-6, 2009.

[13] MIT Lincoln Labs, 1998 DARPA Intrusion Detection Evaluation, http://www.ll.mit.edu/mission/communications/is t/corpora/ideval/ index.html, last Visited, 2008.

[14] Mulgrew B., Grant P., and Thompson J., Digital Signal Processing: Concepts and Applications, Macmillan, 1999.

[15] Nsl-kdd Data Set for Network-based Intrusion Detection Systems, Available on: http://nsl.cs.unb.ca/NSL-KDD/, Last Visited, 2009.

[16] Qassim Q., Patel A., and Mohd-Zin A., Strategy to Reduce False Alarms in Intrusion Detection and Prevention Systems, The International Arab Journal of Information Technology, vol. 11, no. 5, pp. 500-506, 2014.

[17] Revathi S. and Malathi A., Feature Extraction Using Sim-Swadorest Optimization Algorithm for Intrusion Detection, in Proceedings of The International Conference on Recent Innovations in Computer Science and Information Technology, Singapore, pp. 75-79, 2014.

[18] Revathi S., Linkware Technologies Private Limited, Network Simulator Capture (NSC) Dataset. Accessed, https://www.linkware.in/, Last Visited, 2013.

[19] Takagi T. and Sugeno M., Fuzzy Identification of Systems and its Applications to Modeling and Control, IEEE Transactions on Systems, Man, and Cybernetics, vol. 15, no. 1, pp. 116-132, 1985.

[20] Toosi A. and Kahani M., A new Approach to Intrusion Detection based on an Evolutionary Soft Computing Model using Neuro-fuzzy Classifiers, Computing Communication, vol. 30, no. 10, pp. 2201-2212, 2007. Revathi Sujendran received her MSc degree in computer science from St. Joseph College of Arts and Science, Cuddalore, Tamilnadu, India, in 2008 and her MPhil degree in computer science from Bharathidasan University, Trichy, Tamilnadu, India, in 2009. She is now currently pursuing her PhD degree at PG and Research, Department of Computer Science, Government Arts College, affiliated to Bharathiar University, Coimbatore, Tamilnadu, India. She has published 24 Research paper which includes national, International and conference proceedings publications. She has visited Singapore for international conference and got excellent best paper award. Her current research interests include network security, data mining, and computational intelligence. Malathi Arunachalam Graduated from Bharathidasan University in 1989 and completed M.Sc (Computer Science) in 1991 under the same University. She has also received qualified degree of M.phil and Ph.D respectively in Computer Science in the year 2002 and 2012 from Bharathiar University, Coimbatore, India. She has more than two decades of teaching experience and 14 years of research experience. She has completed a funding project by UGC. She is guiding 8 Ph.D scholars and 3 M.Phil Scholars. She has guided and produced 13 M.Phil Scholars. Currently she is working as an Assistant Professor, PG and Research Department of Computer Science, Government Arts College, Coimbatore. She has published 70 Research paper which includes national, International and conference proceedings publications. She has authored three books.