A Cost Sensitive Machine Learning Approach for Intrusion Detection

1
Adamu Teshome
Adamu Teshome
2
Dr.Vuda Sreenivasa Rao
Dr.Vuda Sreenivasa Rao
1 Bahir Dar University

Send Message

To: Author

GJCST Volume 14 Issue C6

Article Fingerprint

ReserarchID

CSTSDE59329

A Cost Sensitive Machine Learning Approach for Intrusion Detection Banner
  • English
  • Afrikaans
  • Albanian
  • Amharic
  • Arabic
  • Armenian
  • Azerbaijani
  • Basque
  • Belarusian
  • Bengali
  • Bosnian
  • Bulgarian
  • Catalan
  • Cebuano
  • Chichewa
  • Chinese (Simplified)
  • Chinese (Traditional)
  • Corsican
  • Croatian
  • Czech
  • Danish
  • Dutch
  • Esperanto
  • Estonian
  • Filipino
  • Finnish
  • French
  • Frisian
  • Galician
  • Georgian
  • German
  • Greek
  • Gujarati
  • Haitian Creole
  • Hausa
  • Hawaiian
  • Hebrew
  • Hindi
  • Hmong
  • Hungarian
  • Icelandic
  • Igbo
  • Indonesian
  • Irish
  • Italian
  • Japanese
  • Javanese
  • Kannada
  • Kazakh
  • Khmer
  • Korean
  • Kurdish (Kurmanji)
  • Kyrgyz
  • Lao
  • Latin
  • Latvian
  • Lithuanian
  • Luxembourgish
  • Macedonian
  • Malagasy
  • Malay
  • Malayalam
  • Maltese
  • Maori
  • Marathi
  • Mongolian
  • Myanmar (Burmese)
  • Nepali
  • Norwegian
  • Pashto
  • Persian
  • Polish
  • Portuguese
  • Punjabi
  • Romanian
  • Russian
  • Samoan
  • Scots Gaelic
  • Serbian
  • Sesotho
  • Shona
  • Sindhi
  • Sinhala
  • Slovak
  • Slovenian
  • Somali
  • Spanish
  • Sundanese
  • Swahili
  • Swedish
  • Tajik
  • Tamil
  • Telugu
  • Thai
  • Turkish
  • Ukrainian
  • Urdu
  • Uzbek
  • Vietnamese
  • Welsh
  • Xhosa
  • Yiddish
  • Yoruba
  • Zulu

The problems with the current researches on intrusion detection using data mining approach are that they try to minimize the error rate (make the classification decision to minimize the probability of error) by totally ignoring the cost that could be incurred. However, for many problem domains, the requirement is not merely to predict the most probable class label, since different types of errors carry different costs. Instances of such problems include authentication, where the cost of allowing unauthorized access can be much greater than that of wrongly denying access to authorized individuals, and intrusion detection, where raising false alarms has a substantially lower cost than allowing an undetected intrusion. In such cases, it is preferable to make the classification decision that has minimum cost, rather than that with the lowest error rate.For this reason, we examine how cost-sensitive machine learning methods can be used in Intrusion Detection systems. The performance of the approach is evaluated under different experimental conditions and different models in comparison with the KDD Cup 99 winner resultsin terms of average misclassification cost, as well as detection accuracy and false positive ratesthough the winner used original KDD dataset whereas for this research NSL-KDD dataset which is new version of the original KDD cup data and it is better than the original dataset in that it has no redundant data is used.

33 Cites in Articles

References

  1. Ajith Abraham,Ravi Jain,Johnson Thomas,Sang Han (2007). D-SCIDS: Distributed soft computing intrusion detection system.
  2. G Ajith,C Crina,Yuehui (2001). Cyber Security and the Evolution of Intrusion Detection Systems.
  3. Bitashadgar Alirezaosareh (2008). Intrusion Detection in Computer Networks based on Machine Learning Algorithms.
  4. X Chai,L Deng,Q Yang,C Ling (2004). Test-Cost Sensitive Naïve Bayesian Classification.
  5. D Denning (1987). An Intrusion-Detection Model.
  6. P Domingos,Metacost (1999). A general method for making classifiers cost-sensitive.
  7. C Drummond,R Holte (2000). Exploiting the cost (in) sensitivity of decision tree splitting the criteria.
  8. Eric Bloedorn,Lisa Talbot,David Debarr (2001). Data Mining Applied to Intrusion Detection: MITRE Experiences.
  9. Charles Elkan (1999). Results of the KDD'99 classifier learning.
  10. C Elkan (2001). The Foundations of Cost-Sensitive Learning.
  11. J Luo (1999). Integrating Fuzzy Logic With Data Mining Methods for Intrusion Detection.
  12. J Mchugh (2000). Testing intrusion detection systems: a critique of the 1998 and 1999 darpa intrusion detection system evaluations as performed by lincoln laboratory.
  13. J Anderson (1980). Computer Security Threat Monitoring and Surveillance, Technicalreport.
  14. S Joseph,A Rod (2003). Intrusion detection: methods and systems.
  15. (null). Table 1: Comparison of KDD Cup 99 and NSL-KDD data sets..
  16. L Ertoz,E Eilerson,A Lazareviv (2004). Using Data Mining for Intrusion Detection.
  17. L Heberlein,K Levitt,B Mukherjee (1991). A Method To Detect Intrusive Activity in a Networked Environment.
  18. W Lee,S Stolfo (2000). A Framework for constructing features and models for intrusion detection systems.
  19. Mahbod Tavallaee,Ebrahim Bagheri,Wei Lu,Ali Ghorbani (2009). A detailed analysis of the KDD CUP 99 data set.
  20. (2010). Table 1: Comparison of KDD Cup 99 and NSL-KDD data sets..
  21. Paul Dokas,Vipin Leventertoz,Kumar,Jaideep Aleksandarlazarevic,Pang-Ning Srivastava,Tan (2001). Data Mining for Network Intrusion Detection.
  22. F Provost (2000). Machine learning from imbalanced data sets 101.
  23. R Heady,G Luger,A Maccabe,M Servilla (1990). The Architecture of a Network Level Intrusion Detection System.
  24. R Heady,G Luger,A Maccabe,M Servilla (1990). The Architecture of a Network Level Intrusion Detection System.
  25. S Wafa,Reyadhsh Al-Sharafat,Naoum (2009). Adaptive Framework for Network Intrusion Detection by Using Genetic-Based Machine Learning Algorithm.
  26. S Selvakani,R Rajesh (2007). Genetic Algorithm for framing rules for intrusion Detection.
  27. V Sheng,C Ling (2006). Thresholding for Making Classifiers Cost-sensitive.
  28. Gene Simsongarfinkel,Spafford (1991). Practical Security.
  29. Sterrybrugger (2004). Data Mining Methods for Network Intrusion Detection.
  30. P Turney (2000). Types of cost in inductive concept learning.
  31. P Turney (1995). Cost-Sensitive Classification: Empirical Evaluation of a Hybrid Genetic Decision Tree Induction Algorithm.
  32. B Zadrozny,C Elkan (2001). Learning and Making Decisions When Costs and Probabilities are Both Unknown.
  33. B Zadrozny,J Langford,N Abe (null). Cost-sensitive learning by cost-proportionate example weighting.

Funding

No external funding was declared for this work.

Conflict of Interest

The authors declare no conflict of interest.

Ethical Approval

No ethics committee approval was required for this article type.

Data Availability

Not applicable for this article.

Adamu Teshome. 2014. \u201cA Cost Sensitive Machine Learning Approach for Intrusion Detection\u201d. Global Journal of Computer Science and Technology - C: Software & Data Engineering GJCST-C Volume 14 (GJCST Volume 14 Issue C6): .

Download Citation

Journal Specifications

Crossref Journal DOI 10.17406/gjcst

Print ISSN 0975-4350

e-ISSN 0975-4172

Classification
Not Found
Version of record

v1.2

Issue date

September 6, 2014

Language

English

Experiance in AR

The methods for personal identification and authentication are no exception.

Read in 3D

The methods for personal identification and authentication are no exception.

Article Matrices
Total Views: 8508
Total Downloads: 2250
2026 Trends
Research Identity (RIN)
Related Research

Published Article

The problems with the current researches on intrusion detection using data mining approach are that they try to minimize the error rate (make the classification decision to minimize the probability of error) by totally ignoring the cost that could be incurred. However, for many problem domains, the requirement is not merely to predict the most probable class label, since different types of errors carry different costs. Instances of such problems include authentication, where the cost of allowing unauthorized access can be much greater than that of wrongly denying access to authorized individuals, and intrusion detection, where raising false alarms has a substantially lower cost than allowing an undetected intrusion. In such cases, it is preferable to make the classification decision that has minimum cost, rather than that with the lowest error rate.For this reason, we examine how cost-sensitive machine learning methods can be used in Intrusion Detection systems. The performance of the approach is evaluated under different experimental conditions and different models in comparison with the KDD Cup 99 winner resultsin terms of average misclassification cost, as well as detection accuracy and false positive ratesthough the winner used original KDD dataset whereas for this research NSL-KDD dataset which is new version of the original KDD cup data and it is better than the original dataset in that it has no redundant data is used.

Our website is actively being updated, and changes may occur frequently. Please clear your browser cache if needed. For feedback or error reporting, please email [email protected]
×

This Page is Under Development

We are currently updating this article page for a better experience.

Request Access

Please fill out the form below to request access to this research paper. Your request will be reviewed by the editorial or author team.
X

Quote and Order Details

Contact Person

Invoice Address

Notes or Comments

This is the heading

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

High-quality academic research articles on global topics and journals.

A Cost Sensitive Machine Learning Approach for Intrusion Detection

Adamu Teshome
Adamu Teshome Bahir Dar University
Dr.Vuda Sreenivasa Rao
Dr.Vuda Sreenivasa Rao

Research Journals