Abstract
Intrusion Detection System is a pattern recognition task whose aim is to detect and report the occurrence of abnormal or unknown network behaviors in a given network system being monitored. In this paper, we propose a machine learning model, advanced Naive Bayesian Classification (NBC-A) which is based on NBC and ReliefF algorithm, to be used in the novel IDS. We use ReliefF algorithm to give every attribute of network behavior in KDD’99 dataset a weight that reflects the relationship between attributes and final class for better classification results. The novel IDS has a higher True Positive (TP) rate and a lower False Positive (FP) rate in detection performance.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Rappaport, T.S., Sun, S., Mayzus, R., Zhao, H.: Millimeter wave mobile communications for 5G cellular: it will work! IEEE Access 1(1), 335–349 (2013)
Boccardi, F., Heath, R.W., Lozano, A., Marzetta, T.L.: Five disruptive technology directions for 5G. IEEE Commun. Mag. 52(2), 74–80 (2013)
Matsui, M.: The first experimental cryptanalysis of the data encryption standard. In: Desmedt, Y.G. (ed.) CRYPTO 1994. LNCS, vol. 839, pp. 1–11. Springer, Heidelberg (1994). https://doi.org/10.1007/3-540-48658-5_1
Biryukov, A., Cannière, C.D.: Data encryption standard (DES) (2005)
Lowe, G.: An attack on the Needham-Schroeder public-key authentication protocol. Inf. Process. Lett. 56(3), 131–133 (1995)
Manner, J., Karagiannis, G., Mcdonald, A.: NSIS signaling layer protocol (NSLP) for quality-of-service signaling. IETF 31(2), 152–160 (2010)
Huang, M.Y., Jasper, R.J., Wicks, T.M.: A large scale distributed intrusion detection framework based on attack strategy analysis. Comput. Netw. 31(23–24), 2465–2475 (1998)
Bache, K., Lichman, M.: UCI Machine Learning Repository (2013)
Flach, P.A., Lachiche, N.: Naive Bayesian classification of structured data. Mach. Learn. 57(3), 233–269 (2004)
Muirhead, D., Imran, M.A., Arshad, K.: Insights and approaches for low-complexity 5G small-cell base-station design for indoor dense networks. IEEE Access 3, 1562–1572 (2015)
Deng, W., Wang, G., Wang, Y.: Weighted Naive Bayes classification algorithm based on rough set. Comput. Sci. 34(2), 204–205 (2007)
Cheng, K., Zhang, C.: Feature-based weighted Naive Bayesian classifier (2006)
Yao, S., Li, L.: Weighted Naïve Bayesian classification algorithm based on correlation coefficients. Int. J. Adv. Comput. Technol. 4(20), 29–35 (2012)
Robnikšikonja, M., Kononenko, I.: Theoretical and empirical analysis of ReliefF and RReliefF. Mach. Learn. 53(1), 23–69 (2003)
Deng, Z., Chung, F.L., Wang, S.: Robust relief-feature weighting, margin maximization, and fuzzy optimization. IEEE Trans. Fuzzy Syst. 18(4), 726–744 (2010)
Hamid, Y., Sugumaran, M., Journaux, L.: Machine learning techniques for intrusion detection: a comparative analysis. In: International Conference on Informatics and Analytics (2016)
Fei, Z., Guo, J., Wan, P., Yang, W.: Fast automatic image segmentation based on Bayesian decision-making theory. In: International Conference on Information and Automation (2009)
Zhang, C., Wang, J.: Attribute weighted Naive Bayesian classification algorithm. Microcomputer Information, pp. 27–30 (2010)
Han, J., Kamber, M., Pei, J.: Data Mining: Concepts and Techniques, 2nd edn. (The Morgan Kaufmann Series in Data Management Systems) (2006)
Pfahringer, B.: Winning the KDD99 classification cup: bagged boosting. ACM SIGKDD Explor. Newsl. 1(2), 65–66 (2000)
Acknowledgments
This research was supported by the National Key Research and Development Program of China (2016YFB0100902).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Wang, Y. et al. (2018). A Novel Intrusion Detection System Based on Advanced Naive Bayesian Classification. In: Long, K., Leung, V., Zhang, H., Feng, Z., Li, Y., Zhang, Z. (eds) 5G for Future Wireless Networks. 5GWN 2017. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 211. Springer, Cham. https://doi.org/10.1007/978-3-319-72823-0_53
Download citation
DOI: https://doi.org/10.1007/978-3-319-72823-0_53
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-72822-3
Online ISBN: 978-3-319-72823-0
eBook Packages: Computer ScienceComputer Science (R0)