An Improved Approach Based on Density-Based Spatial Clustering of Applications with a Noise Algorithm for Intrusion Detection
Network Intrusion detection systems (NIDS) are extremely important for make the network secure from unauthorized access. Numerous studies have already been conducted to detect the unauthorized access to achieve security. As the NIDS are still lacking in terms of accuracy, true positive rate (TPR) and the false positive rate (FPR) of the invasive events. The main cause of high FPR in intrusion detection systems is run with a default set of signatures. Issues in the detection rate are caused by feature similarities between man-made events and environmental events. Considering this fact, in this paper, we introduced a new intrusion detection algorithm named as I-DBSCAN by focusing on the above-mentioned issues to get the better results from the previously done experiments. We used clustering and classification techniques. The proposed algorithm is an enhanced version of the existing DBSCAN algorithm. However, this research can spot attacks on data from IDS. It is found that the novel algorithm achieved more accuracy when it is applied to four classification methods on KDD Cup 99 and NSL-KDD Cup99 data. The results of our proposed methodology are more efficient with the achievement of better accuracy level and false positive rate (FPR).
Keywords: density-based spatial clustering of applications with noise, false positive rate, intrusion detection system, network intrusion detection system.
WANG B, YAO X, JIANG Y, SUN C, and SHABAZ M. Design of a real-time monitoring system for smoke and dust in thermal power plants based on improved genetic algorithm. [J] Journal of Healthcare Engineering, 2021, 2021, article id 7212567: 1-10, https://doi.org/10.1155/2021/7212567
SEVILLA F R S, et al. State-of-the-art of data collection, analytics, and future needs of transmission utilities worldwide to account for the continuous growth of sensing data. [J] International Journal of Electrical Power Energy Systems, 2022, 137, article id 107772.
SHARIF Z, JUNG L T, and AYAZ M. Priority-based Resource Allocation Scheme for Mobile Edge Computing. [C] Proceeding of the 2nd International Conference on Computing and Information Technology (ICCIT), 2022: 138-143.
LULLA G, KUMAR A, POLE G, and DESHMUKH G. IoT based Smart Security and Surveillance System. [C] Proceeding of the International Conference on Emerging Smart Computing and Informatics (ESCI), 2021: 385-390.
SICARD F, ZAMAÏ É, FLAUS J-M, and SAFETY S. An approach based on behavioral models and critical states distance notion for improving cybersecurity of industrial control systems. [J] Reliability Engineering, 2019, 188: 584-603.
JAHROMI A N, KARIMIPOUR H, DEHGHANTANHA A, and CHOO K-K R. Toward Detection and Attribution of Cyber-Attacks in IoT-Enabled Cyber–Physical Systems. [J] IEEE Internet of Things Journal, 2021, 8(17): 13712-13722.
SHARIF Z, JUNG L T, AYAZ M, YAHYA M, and KHAN D. Smart Home Automation by Internet-of-Things Edge Computing Platform. International Journal of Advanced Computer Science Applications, 2022, 13(4): 474-484.
LIN K-S, YEH K-H, CHIANG Y-J, and WANG L. Fiber-optic perimeter intrusion detection by employing a fiber laser cavity in each defensed zone. [J] IEEE Sensors Journal, 2018, 18(20): 8352-8360.
AJOUH H H, JAVIDAN R, KHAYAMI R, et al. A two-layer dimension reduction and two-tier classification model for anomaly-based intrusion detection in IoT backbone networks. [J] IEEE Transactions on Emerging Topics in Computing, 2016, 7(2): 314-323.
SHARMA J, GIRI C, GRANMO O-C, and GOODWIN M. Multi-layer intrusion detection system with ExtraTrees feature selection, extreme learning machine ensemble, and softmax aggregation. [J] EURASIP Journal on Information Security, 2019, (1): 1-16.
SHARIF Z, et al. Internet-of-Things based Home Automation System using Smart Phone. [J] Sir Syed University Research Journal of Engineering Technology, 2021, 11(2): 70-76.
JAN S U, AHMED S, SHAKHOV V, and KOO I. Toward a lightweight intrusion detection system for the internet of things. [J] IEEE Access, 2019, 7: 42450-42471.
AYAZ M, AMMAD-UDDIN M, SHARIF Z, et al. Internet-of-Things (IoT)-based smart agriculture: Toward making the fields talk. [J] IEEE Access, 2019, 7: 129551-129583.
SHARIF Z, JUNG L T, RAZZAK I, and ALAZAB M. Adaptive and Priority-based Resource Allocation for Efficient Resources Utilization in Mobile Edge Computing. [J] IEEE Internet of Things Journal, 2021: 1-15, https://doi.org/10.1109/JIOT.2021.3111838.
CHEN P, YOU C, and DING P. Event classification using improved salp swarm algorithm based probabilistic neural network in fiber-optic perimeter intrusion detection system. [J] Optical Fiber Technology, 2020, 56, article id 102182, https://doi.org/10.1016/j.yofte.2020.102182
SAHEED Y K, ABIODUN A I, MISRA S, et al. A machine learning-based intrusion detection for detecting internet of things network attacks. [J] Alexandria Engineering Journal, 2022, 61(12): 9395-9409.
KOZIK R, CHORAŚ M, FICCO M, et al. A scalable distributed machine learning approach for attack detection in edge computing environments. Journal of Parallel, 2018, 119: 18-26.
TSIKALA VAFEA M, et al. Emerging technologies for use in the study, diagnosis, and treatment of patients with COVID-19. Cellular, 2020, 13(4): 249-257.
UDDIN M, AYAZ M, MANSOUR A, et al. Cloud-connected flying edge computing for smart agriculture. [J] Peer-to-Peer Networking Applications, 2021, 14(6): 3405-3415.
OTOOM M, OTOUM N, ALZUBAIDI M A, et al. An IoT-based framework for early identification and monitoring of COVID-19 cases. [J] Biomedical Signal Processing, 2020, 62, article id 102149.
KUMAR S, RAUT R D, and NARKHEDE B. A proposed collaborative framework by using artificial intelligence-internet of things (AI-IoT) in COVID-19 pandemic situation for healthcare workers. [J] International Journal of Healthcare Management, 2020, 13(4): 337-345.
JIN F, CHEN M, ZHANG W, et al. Intrusion detection on internet of vehicles via combining log-ratio oversampling, outlier detection and metric learning. [J] Information Sciences, 2021, 579: 814-831.
DIRO A A, and CHILAMKURTI N. Distributed attack detection scheme using deep learning approach for Internet of Things. [J] Future Generation Computer Systems, 2018, 82: 761-768.
E. HODO et al. Threat analysis of IoT networks using artificial neural network intrusion detection system. [C] Proceedings of the International Symposium on Networks, Computers and Communications (ISNCC), 2016: 1-6.
JAVAID A, NIYAZ Q, SUN W, et al. A deep learning approach for network intrusion detection system. Eai Endorsed Transactions on Security, 2016, 3(9): e2.
RGHIOUI A, KHANNOUS A, and BOUHORMA M. Denial-of-Service attacks on 6LoWPAN-RPL networks: Threats and an intrusion detection system proposition. [J] Journal of Advanced Computer Science, 2014, 3(2): 143-153.
XIANG C, CHONG M, and ZHU H. Design of mnitiple-level tree classifiers for intrusion detection system. [C] Proceedings of the IEEE Conference on Cybernetics and Intelligent Systems, 2004, 2: 873-878.
WU Y, KE Y, CHEN Z, et al. Application of alternating decision tree with AdaBoost and bagging ensembles for landslide susceptibility mapping. [J] Catena, 2020, 187, 104396.
RAJASEGARAR S, LECKIE C, and PALANISWAMI M. Anomaly detection in wireless sensor networks. [J] IEEE Wireless Communications, 2008, 15(4): 34-40.
RAZA S, WALLGREN L, and VOIGT T. SVELTE: Real-time intrusion detection in the Internet of Things. [J] Ad Hoc Networks, 2013, 11(8): 2661-2674.
KUMAR K S, NAIR S A H, ROY D G, et al. Security and privacy-aware artificial intrusion detection system using federated machine learning. [J] Computers, 2021, 96, 107440.
ATUL D J, et al. A machine learning based IoT for providing an intrusion detection system for security. [J] Microprocessors, 2021, 82, 103741.
LAN T, ZHANG C, LI L, et al. Perimeter security system based on fiber optic disturbance sensor. [C] Advanced Sensor Systems and Applications, SPIE, 2007, 6830: 107-112, https://doi.org/10.1117/12.756541.
XIANG C, YONG P C, and MENG L S Design of multiple-level hybrid classifier for intrusion detection system using Bayesian clustering and decision trees. [J] Pattern Recognition Letters, 2008, 29(7): 918-924.
HAN X, XU D, and LIU Y. Application of principal components analysis in condenser fault diagnosis. [C] Proceedings of the 6th World Congress on Intelligent Control and Automation, 2006, 2: 5666-5669.
ALLWOOD G, WILD G, and HINCKLEY S. Optical fiber sensors in physical intrusion detection systems: A review. [J] IEEE Sensors Journal, 2016, 16(14): 5497-5509.
IQBAL S, HUSSAIN I, SHARIF Z, et al. Reliable and energy-efficient routing scheme for underwater wireless sensor networks (UWSNs). [J] International Journal of Cloud Applications Computing, 2021, 11(4): 42-58.
HALL M, FRANK E, HOLMES G, et al. The WEKA data mining software: an update. [J] ACM SIGKDD Explorations Newsletter, 2009, 11(1): 10-18.
AHMAD T, and MUCHAMMAD K. L-SCANN: Logarithmic subcentroid and nearest neighbor. [J] Journal of Telecommunications Information Technology, 2016, 4: 71-80.
KHADIJA M A, WIDYAWAN S, and NUGROHO I L E. Detecting network intrusion by combining DBSCAN, principle component analysis and ranker. [C] Proceedings of the International Seminar on Research of Information Technology and Intelligent Systems, 2019: 165-170.
- There are currently no refbacks.