Ensemble methods in intrusion detection

As services are being deployed on the internet, there is the need to secure the infrastructure from malicious attacks. Intrusion detection serves as a second line of defense apart from firewall and cryptography. There are many techniques employed in intrusion detection which include signature detect...

Full description

Bibliographic Details
Main Author: Josiah, Kekere Temitope (Author)
Format: Thesis
Published: 2015-01.
Subjects:
Online Access:Get fulltext
LEADER 01824 am a22001573u 4500
001 53615
042 |a dc 
100 1 0 |a Josiah, Kekere Temitope  |e author 
245 0 0 |a Ensemble methods in intrusion detection 
260 |c 2015-01. 
520 |a As services are being deployed on the internet, there is the need to secure the infrastructure from malicious attacks. Intrusion detection serves as a second line of defense apart from firewall and cryptography. There are many techniques employed in intrusion detection which include signature detection, anomaly and specification based detection system. These techniques often trade off accuracy with false positive rate. In this study, anomaly detection using ensembles is used to automatically classify and detect attack patterns. It has been proven that ensembles of classifier outperform their base classifiers. Several multiples of classifiers have been combined to improve the performance of intrusion detection system. Commonly used classifiers include Support Vector Machines, Decision Trees, Genetic Algorithms, Fuzzy, Principal Component Analysis. The study employed KStar clustering and Instance Based classification algorithms to detect intrusions in NSL-KDD dataset. The results show that the ensemble we designed has a 1-error rate of 99.67% and false positive 0.33%. The response time of the anomaly is 0.18seconds. The chosen ensemble outperformed the rest of the ensembles (rPART & SMO and J48) and the base classifiers. The performance of the combiners has showed that the study has built a model with high detection, and reduced error. 
546 |a en 
650 0 4 |a QA75 Electronic computers. Computer science 
655 7 |a Thesis 
787 0 |n http://eprints.utm.my/id/eprint/53615/ 
856 |z Get fulltext  |u http://eprints.utm.my/id/eprint/53615/25/KekereTemitopeJosiahMFC2015.pdf