Skip to main content

An Escalated Approach to Ant Colony Clustering Algorithm for Intrusion Detection System

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 4904))

Abstract

Intrusion detection systems are increasingly a key part of systems defense. Various approaches to intrusion detection are currently being used, but they are relatively ineffective. Constructing and maintaining a misuse detection system is very labor-intensive since attack scenarios and patterns need to be analyzed and categorized, and the corresponding rules and patterns need to be carefully hand-coded. Thus data mining can be used to ease this inconvenience. This paper proposes a multiple level hybrid classifier for an intrusion detection system that uses a combination of tree classifiers which rely on labeled training data and applies an Ant colony clustering algorithm for mixed data. The main advantage of this approach is that the system can be trained with unlabelled data and is capable of detecting previously “unseen” attacks. Verification tests have been carried out by using the 1999 KDD Cup data set. From this work, it is observed that significant improvement has been achieved from the viewpoint of both high intrusion detection rate and reasonably low false alarm rate.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Yu, Z.-x., Chen, J.-R., Zhu, T.-Q.: A Novel Adaptive Intrusion Detection System Based on Data Mining. In: Proceedings of the fourth international Conference on Machine learning and Cybernetics, Guangzhou, pp. 2390–2395 (August 2005)

    Google Scholar 

  2. Axelsson, S.: Intrusion Detection Systems: A Survey and Taxonomy. Technical Report No 9, Dept. of Computer Engineering, Chalmers, University of Technology, Sweden, pp. 9–15 (2000)

    Google Scholar 

  3. Denning, D.E.: An Intrusion Detection Model. IEEE Transactions on Software Engineering 51(8), 12–26 (2003)

    Google Scholar 

  4. Denning, D.E., Neumann, P.G.: Requirements and Model for IDES-A Real-Time Intrusion Detection System, Technical Report, Computer Science Laboratory, SRI International, Menlo Park, California, pp. 58–63 (1985)

    Google Scholar 

  5. Chen, L., Xu, X.-H., Chen, Y.-X.: An Adaptive Ant Colony Clustering Algorithm. In: Proceedings of the third international conference on Machine Learning and Cybernetics, Shanghai, pp. 26–29 (August 2004)

    Google Scholar 

  6. Xiang, C., Chong, M.Y., Zhu, H.L.: Design of Multiple-Level Tree Classifier for Intrusion Detection System. In: Proceedings of 2004 IEEE Conference on Cybernetics and Intelligent Systems, Singapore, pp. 872–877 (December 2004)

    Google Scholar 

  7. KDD Cup 1999 Data, Information and Computer Science, University of California, Irvine (1999), http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html

Download references

Author information

Authors and Affiliations

Authors

Editor information

Shrisha Rao Mainak Chatterjee Prasad Jayanti C. Siva Ram Murthy Sanjoy Kumar Saha

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Rajeswari, L.P., Kannan, A., Baskaran, R. (2007). An Escalated Approach to Ant Colony Clustering Algorithm for Intrusion Detection System. In: Rao, S., Chatterjee, M., Jayanti, P., Murthy, C.S.R., Saha, S.K. (eds) Distributed Computing and Networking. ICDCN 2008. Lecture Notes in Computer Science, vol 4904. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-77444-0_41

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-77444-0_41

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-77443-3

  • Online ISBN: 978-3-540-77444-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics