Design of a Network-Based Anomaly Detection System using vfdt algorithm



Download 56.21 Kb.
Date16.07.2017
Size56.21 Kb.
#23466

Design of a Network-Based Anomaly Detection System using VFDT Algorithm

M. Salamah and N. Alwan



Computer Engineering Department, Eastern Mediterranean University, TRNC, Mersin 10, TURKEY

{Muhammed.salamah@emu.edu.tr, nasir_19772002@yahoo.com }


Abstract: With the tremendous growth of network-based services and sensitive information on networks, network security is getting more and more importance than ever. Intrusion poses a serious security risk in a network environment. The ever growing new intrusion types have a serious problem for their detection. In this paper, we apply one of the efficient data mining algorithms called Very Fast Decision Tree (VFDT) for anomaly based network intrusion detection. Experimental results on the Knowledge Discovery Data Mining KDDcup’99 data set show that our approach is highly effective in detecting network intrusion. It is observed that the proposed technique performs better in terms of detection rate, false alarm rate, and computational time compared with other techniques.

Keywords: Very Fast Decision Tree Algorithm, Classifier, Network Security, Intrusion Detection System, KDD CUP99 dataset.



I. INTRUDUCTION

In our society, information is becoming increasingly dependent on rapid access and interactive processing. As this demand increases, more information is being stored on computers. The proliferation of inexpensive computers and computer networks has worsened the problem of unauthorized access and tampering with data. With an increased understanding of how systems work, intruders have become highly skilled at diagnosing weaknesses in systems, and exploiting them to obtain such privileges that they can do anything on the system. They also use patterns that are difficult to trace and identify. Computer systems are therefore not likely to remain safe in the nearest future because of the intruder’s acts. Therefore, we must have measures in place to detect security breaches, i.e., identify intruders and their methods of intrusion [1].

An Intrusion Detection System (IDS) inspects the activities in a system for suspicious behavior or patterns that may indicate system attack or misuse. There are two main categories of intrusion detection techniques; Anomaly detection and Misuse detection [2]. The former analyses the information gathered and compares it to a defined baseline of what is seen as “normal” service behavior, so it has the ability to learn how to detect network attacks that are currently unknown. Misuse Detection is based on signatures for known attacks, so it is only as good as the database of

attack signatures that it uses for comparison. Misuse detection has low false alarm rate, but cannot detect novel attacks. However, anomaly detection can detect unknown attacks, but has a bit higher false alarm rate. In this paper, we review the performance of classifiers when trained to identify signatures of specific attacks.

The simulated attacks are classified as follows [3]:

Denial of Service Attack (DoS): this is an attack which makes some computing or memory resource too busy or too full to handle legitimate requests, or denies legitimate users access to a machine.

Probing Attack (prob): this is an attempt to gather information about a network of computers for the apparent purpose of circumventing its security controls.
User to Root Attack (U2R): this is a class of exploit in which the attacker starts out with the access to a normal user’s account on the system (perhaps gained by sniffing passwords, a dictionary attack, or social engineering) and is able to exploit some vulnerability to gain root access to the system.

Remote to Local Attack (R2L): it occurs when an attacker has the ability to send packets to a machine over a network, but does not have an account on that machine to exploit some vulnerability to gain local access as a user of that machine.

In [4], Audit Data Analysis and Mining (ADAM) is an intrusion detector system built to detect intrusions using data mining techniques. It first absorbs training data known to be free of attacks. Next, it uses an algorithm to group attacks, unknown behavior, and false alarms. ADAM has several useful capabilities, namely;

- Classifying an item as a known attack

- Classifying an item as a normal event,

- Classifying an item as an unknown attack,

The Intrusion Detection using Data Mining Technique (IDDM) [5] is a real-time network IDS (NIDS) for misuse and anomaly detection. It applies association rules, Meta rules, and characteristic rules. It employs data mining to produce description of network data and uses this information for deviation analysis. Mining Audit Data for Automated Models for Intrusion Detection (MADAM ID) [6] is one of the best known data mining projects in intrusion detection. It is an off-line IDS to produce anomaly and misuse intrusion detection models. Association rules and frequent episodes are applied in MADAM ID to replace hand-coded intrusion patterns and profiles with the learned rules.


In [7], the author proposes a method of intrusion detection using an evolving fuzzy neural network. This type of learning algorithm combines Artificial Neural Network (ANN) and Fuzzy Inference Systems (FIS), as well as evolutionary algorithms. They create an algorithm that uses fuzzy rules and allow new neurons to be created in order to accomplish this. They use Snort to gather data for training the algorithm and then compare their technique with that of an augmented neural network.

In [8], a statistical neural network classifier for anomaly detection is developed, which can identify UDP flood attacks. Comparing different neural network classifiers, the Back Propagation Neural Network (BPN) has shown to be more efficient in developing IDS. In [9], the author uses the back propagation method by Sample Query and Attribute Query for the Intrusion Detection, whereby analyzing and identifying the most important components of training data. It could reduce processing time, storage requirement, etc.


In [10], the authors combine multiple host-based detectors using decision tree. They use conventional measures for intrusion detection and modeling methods appropriate to each measure. System calls, resource usage and file access events are used to measure user’s behavior and Hidden Markov model. Statistical Rule-base method is used to model these measures which are combined with diction tree. The proposed detection method is expected to have a better performance because it can model normal behaviors from various perspectives. The decision tree used here C4.5 algorithm.
This paper gives a comparative study of several anomaly detection schemes for identifying novel network intrusion detections. We present experimental results on Knowledge Discovery Data Mining KDDCup’99 data set. The experimental results have demonstrated that using the VFDT classifier model is much more efficient in the detection of network intrusions, compared with other classification techniques.

The remainder of this paper is organized as follow. Section II presents the proposed Network-based Anomaly Detection System (NADS), and also gives general information about IDS. Section III presents the experimental results. Finally, section IV concludes the paper.



II. THE PROPOSED NADS SYSTEM

The proposed NADS system has the possibility of working in either online or offline modes. This depends on the type of features used to train and test the system. The online mode works on the basic features of an extraction using the header of packets only. (e.g. protocol type, service, flag, src_bytes, dst_bytes). These features are organized as connection records to enter into the model directly to determine the nature of the connection as soon as possible, and give the appropriate response. The offline mode works on the basic statistical features extracted from the header and the content of the packets. The statistical features are determined when the session is terminated, and they are organized as connection records. A large number of packets are needed to identify accurate connections, and then store them in the file in the form of connection records in order to be entered into the classified model to test their classes as normal. This mode gives accurate results, but at the expense of time. Both modes requires adequate connection information to train the proposed model. Therefore the system working update gets information at any time to obtain a sufficient number of connections to build a decision tree for a classification of attacks. VFDT is a high-performance data mining algorithm based on Hoeffding trees. Many classification learning methods have been proposed, of which the decision tree learning method is commonly used, because it is fast and the description of classifiers that it derives is easily understood. As data arrives, this data stream grows gradually while the data is classified [6]. VFDT allows the use of either information gain or the Gini index as attribute evaluation measure. It includes a number of refinements to the algorithm [6]. VFDT does not accumulate examples in main memory, because it can gradually grow without waiting for the arrival of all the examples [7].

The architecture of the Network-based Anomaly Detection System (NADS) is shown in the Figure 1. Although different NADS approaches exist, but all of them has these basic modules or stages [7]:

Parameterization: The representation of the observed instances in the target system as a pre-established from.
Training stage: The process of educating the system and grouping the connections as normal or abnormal, and the building of the corresponding model.
Detection stage: A comparison between the models for the system built with the parameterized or observed traffic. If any deviation found exceeds a given threshold, an alarm will be announced.

lab cyyopy.jpg

Fig.1. Network-based NADS Anomaly Detection System

III. EXPERIMENTS AND RESULTS

In this section, we summarize our experimental results in detecting network intrusion using the VFDT algorithm over KDDCup’99 data set. We first describe the data set used in the experiments and then discuss the results obtained. Finally, we evaluate our approach and compare the results with the results obtained by other researchers.

We carried out four experiments on KDD CUP99 dataset in order to get the best results. The conditions of these experiments are as follows:

Experiment 1: We used the whole KDD CUP99 dataset for training, but we selected 20 features only.

Experiment 2: We used the whole KDD CUP99 dataset for training, but we choose 15 features.

Experiment 3: We used 10% of the KDD CUP99 dataset for training, and we selected 15 or 20 features.

Experiment 4: We used the whole KDD CUP99 dataset for training, but we choose only the basic features.

The Confusion Matrix (CM) shown in Table 1 is used to measure of performances of IDS systems and it has the following entries:



  1. True Positive (TP): Number of connections that were correctly classified as attacks.

  2. True Negative (TN): Number of connections that were correctly classified as normal.

  3. False Positive (FP): Number of normal connections that were classified as attacks.

  4. False Negative (FN): Number of attack connections that were classified as normal.

Table 1: Confusion Matrix (CM) [10].






Normal

Intrusion (Attack)

Normal

TN

FP

Intrusion (Attack)

FN

TP

The performance metrics used are: the detection rate (DR), the false alarm rate (FAR), the total training time (TT), and the true positive percentage (TP%).

The DR is the percentage of the truly (correctly) classified attacks as shown in equation (1). The FAR is the percentage of wrongly classified normal connections as shown in equation (2). The TT is the total time used for training of the data set.



(1)

(2)

For the attacks DoS, probe, U2R, and R2L, the True Positive percentage (TP %) is defined as the number of the related attack TP’s over the total number of TP's.

The results of these experiments can be seen in Table 2.

The first experimental result indicated that the proposed NADS system achieved a DR percent of 93.83 % for attacks by using the VFDT algorithm, whereas the achieved FAR rate is 0.608%. In addition, the TP% for DoS, Probe, U2R, and R2L is 93.10%, 79.04%, 22.84%, and 36.64% respectively.

The result of the second experiment is close to the first experiment, although the detection rate for U2R becomes zero.

The third experimental result indicated that the proposed NADS system achieved a DR percent of 95.53 % and a FAR percent of 0.993%. In addition, the TP% for DoS, Probe, U2R, and R2L is 96.4%, 24.2%, 75.6%, and 81.6% respectively.

The fourth experimental result indicated that the proposed NADS system achieved a DR percent of 90.34 % and a FAR rate of 0.78%. In addition, the TP% for DoS, Probe, U2R, and R2L is 92.67%, 75.4%, 0%, and 31.32% respectively.

Table 2: Performance metrics for the four experiments



Experiment No.

DR%

FAR%

DoS TP%

Probe TP%

U2R TP%

R2L TP%

1

93.83

0.608

93.10

79.04

22.84

36.64

2

92.56

0.720

88.10

80.00

0

33.60

3

95.53

0.993

96.40

24.20

75.60

81.60

4

90.34

0.780

92.67

75.40

0

31.32

The following parameters are discussed to clarify our results precisely in terms of system accuracy, classification speed, and memory allocation.


A. System Accuracy Results
Receiver Operating Characteristic (ROC) which is a procedure, derived from statistical decision theory that was developed in the context of electronic signal detection. It is used to evaluate the predictive ability of classifiers. ROCs are plotted in coordinates which are spanned by the rates of DR, and FAR classification.
The proposed NADS system has a high accuracy performance when compared with other systems. The ROC curve of the system is shown in Figure 2. The goal is to detect many attacks while minimizing the generation of FAR. It is clear from Figure 2 that our system is able to detect most of the attacks with a DR rate of 93.83%, and at a low FAR rate of 0.608%.
roc....jpgFig.2.The ROC curve for the NADS system
B. Classification Speed Results
Figure 3 shows the training time versus number of connections. The NADS system uses 100,000 connections at time 4.09s, whereas it uses1000, 000 connections at time 38.97s.
C. Memory Allocation Results
Figure 4 shows the number of nodes which are created by using the VFDT algorithm. The unexpected increasing at the beginning of the chart represents the beginning of the construction of a tree. The sufficient number of connections is collected to be able to classify all types of attacks in the same tree. It continues in increasing gradually, while the number of nodes is almost stable.
22222.jpgFig.3. Training time versus number of connections

77.jpgFig.4. Number of created nodes versus number of connections

Finally, table 2. Shows the comparison of the proposed system with other systems in terms of DR and TT. The results indicated that the proposed NADS system achieved a high classification accuracy rate of 93% by using the VFDT algorithm. It is the highest performance compared with all other algorithm except the Genetic Programming (GP) algorithm where it has a higher DR rate of 98%. The speed of training (building and testing) didn't exceed 39.88 seconds for the proposed system, whereas it is in terms of hours for others systems.

Table 2: Comparison of the proposed NADS system with other systems

system

DR%

TT in sec

NADS

93.825

39.88

ANN

92.268

780

FL

91.25

87.9

BN

90.62

6.28

MLP

92.03

350.15

SOM

91.65

192.16

SVM

57.6

1040.4

GP

98

6480

IV. CONCLUSION

In this paper, we have proposed a Network-based Anomaly Detection System (NADS) which helps to take insidious attacks under control. This technique works in two modes, on-line and offline modes. The proposed NADS system uses the Very Fast Decision Tree algorithm (VFDT), and it classifies the connections as normal or abnormal. It is worth mentioning that the proposed NADS system outperforms other schemes in terms of training time per example since it has the lowest time. The proposed system was able to detect most of the attacks with a DR rate of 93.83%, and at a low FAR rate of 0.608%.

As a future work, this study can be extended in different aspects such as:


  • The proposed NADS system used the VFDT algorithm for detection. Hence, it can be analyzed using other detection algorithms as well.

  • As the proposed NADS system uses “anomaly detection technique”, it can be modified to use the misuse technique as well.

REFERENES

[1] Sandeep k., “classification and detection of computer intrusions”, PhD Thesis, Purdue University, August 1995.

[2] Ali A., Wei L and Mahbod T., “Network Intrusion detection and prevention concepts and Techniques”, Springer Media, New York LLC, 2010.

[3] Terry E., “intrusion detection: network security Beyond the Firewall,” John Wiley and sons, New York, USA, 1998.

[4] Andrew G. Blank, “TCP/IP Jumpstart: internet protocol Basics”,2nd Edition, john wiley and Sons, 2002.

[5] Hamdan o. Alanazi, Rafidah Md. Noor, B, b. Zaidan and A. A. Zaidan,”intrusion detection system: Overview”, Journal of computing, Vol. 2, Issue 2, pp.32-48, February 2010.

[6] Tasuya M. Ayahiko N., “ detection of Fraud use of credit card by Extended VFDT ,” IEEE Transactions on knowledge and data Engineering(TKDE), Vol. 21, No. 11, pp. 1505-1514, 2011.

[7] Zhi-Hua Z., Hang L. and Qiang Y., “Advances is Knowledge Discovery and Data Mining,” 11th Pacific-Asia Conference, PAKDD, Springer, China, Vol. 4426, 2007.

[8] Wenke L., Salvatore J. Stolfo and Kui W. Mok, “A Data Mining Framework for Building intrusion detection Models,“ IEEE Symposium on Security and Privacy, pp. 120-132, 1999.

[9] Pang-Ning T., Michael S. and Vipin K., “introduction to data mining”, 2nd Edition, Addison Wesley, March 2006.



[10] Sang-Jun H., sung-Bae C., “combining Multiple Host-Based Detectors using decision tree,” 16th Australian conference on Artificial intelligence, Springer, Vol. 2903, pp.208-220, 2003.

Muhammed SALAMAH received the B.S., M.S., and PhD. degrees in Electrical and Electronics Engineering from Middle East Technical University in 1988, 1990, and 1995, respectively. From 1988 to 1996, he worked as a Research Assistant and Lecturer in METU. In 1995, he worked as a visiting researcher in the Networks Department of Ecole Nationale Superieure des Telecommunications in Paris, France. Since 1996, he has been with Department of Computer Engineering at Eastern Mediterranean University, TRNC, Turkey, where he is an Assoc. Professor. He served as the Assistant Chairman of the Computer Engineering Department of EMU from 1997 to 2004; the chair of the Student Project and Design Center in EMU from 2005 to 2008; Rectorate Coordinator for Student Affairs and Informatics from 2008 to 2010; head of the Computer Engineering Department of EMU from 2010 to 2013, and since 2013 he has been serving as the Rector's Advisor for Middle East in EMU. His current research interests are computer networks and wireless networks with emphasis on resource allocation and management, performance evaluation, multiprocessing, and hardware-oriented algorithms.drsalamah_cut1


Naseer Alwan Hussein received the MS degree in Computer Engineering from Eastern Mediterranean University, TRNC, Turkey, in 2014. His current research interests are in wireless. Communications, molecular communications, bio inspired communications, and nano networks.

Directory: conference -> wp-content -> uploads
conference -> Simulation and Prediction of Storm Surges, Waves, and Morphological Changes due to Tropical Cyclones by Using a pc-based Integrated Coastal Process Model
conference -> Panel 0511 Disability and Difference I: Post-War Journeys through Disability
conference -> Do remittances have a flip side? A general equilibrium analysis of remittances, labor supply responses and policy options for Jamaica* Maurizio Bussolo and Denis Medvedev
conference -> Conference approval process made easy for acm in cooperation conferences
conference ->  Proceedings of gt2009 asme turbo Expo 2009: Power for Land, Sea and Air Orlando, Florida, USA gt2009-59981 dynamics of premixed h2/CH4 flames under near blowoff conditions
conference -> South Korea’s Economic Future: Industrial Policy, or Economic Democracy?
conference -> Asset rotator Cuff Rehabilitation Course Faculty Dr. Spero Karas
conference -> Acm word Template for sig site
uploads -> Abstracts for the Panel Sessions resúmenes de los paneles
uploads -> Pre-Workshop Intensive Laboratory Experience Schedule

Download 56.21 Kb.

Share with your friends:




The database is protected by copyright ©ininet.org 2024
send message

    Main page