Attacks classification in Network Intrusion Detection System Using ANN

advertisement
International Journal of Application or Innovation in Engineering & Management (IJAIEM)
Web Site: www.ijaiem.org Email: editor@ijaiem.org
Volume 3, Issue 4, April 2014
ISSN 2319 - 4847
Attacks classification in Network Intrusion
Detection System Using ANN
Dr.A.P. Adsul1,Pooja Danke2 ,Meghana Jagdale3,Kuldeep Chaudhari4,Samarth Jadhav5
1,2,3,4,5
Sinhgad Institute Of Technology And Science
Abstract
Nowadays with the dramatic growth in communication and computer networks, security has become a critical subject for
computer systems. A good way to detect the algorithms, methods and applications are created and implemented to solve the
problem of detecting the attacks in intrusion detection systems. Most methods detect attacks and categorize in two groups, normal
or threat. This work presents a new approach of intrusion detection system based on artificial neural network. This work utilizes a
Multi-Layer Perceptron (MLP) for intrusion detection system. The designed system will detect the attacks and classify them in six
groups with the two hidden layers of neurons in the neural network.
Keywords: Artificial Neural Networks (ANN), Intrusion Detection System (IDS), MLP, Network Security.
1. INTRODUCTION
Today because of existence of Internet and highly increase in usages of computers and Internet by people, companies and
governments doing their works and the dependency of systems to computer networks, as a result the security plays an
essential role to prevent the attacks. The highly connected computing world has also equipped the intruders and hackers
with new facilities for their destructive purposes. To detect malicious, illegal activities and brief attack description we
needed efficient intrusion detection system. The system designed in this work usage the artificial neural network to
minimize false positive and false negative alarms and improves the detection rate of attacks. For real time detection we
are considering ICMP packets only.
Artificial Neural Network (ANN) is the network of individual neurons. Each neuron in a neural network acts as an
independent processing element. Each processing element (neuron) is fundamentally a summing element followed by an
activation function. The most successful application of neural network is classification or categorization and pattern
recognition. There are two types of learning Supervise and Unsupervised. Multilayer Perceptron is well known
architecture of supervised learning. The MLP is employed for Pattern Recognition problems.
2. System Architecture
The figure 2.1 illustrates the architecture of the attack classification system. In this the Packet Monitor module monitors
network stream real time and capture packets to serve for the data source of the NIDS. In the pre-processing phase,
network traffic collected and processed for use as input to system. The Feature Extractor module extracts feature vector
from the network packets (connection records) and submits the feature vector to classifier module. The function of
Classifier module is to analyse the network stream and to draw a conclusion whether intrusion happens or not. When
detecting intrusion happens, Decision module will send a warning message to user.
Figure 2.1: System Architecture
Volume 3, Issue 4, April 2014
Page 397
International Journal of Application or Innovation in Engineering & Management (IJAIEM)
Web Site: www.ijaiem.org Email: editor@ijaiem.org
Volume 3, Issue 4, April 2014
ISSN 2319 - 4847
The Knowledgebase module serves for the training samples of the classifier phase. The artificial neural network can work
effectively only when it has been trained correctly and sufficiently. The intrusion samples can be perfected under user
participation, so the capability of the detection can improve continually.
Attacks Classification: There are at least four different known categories of computer attacks including denial of service
(DOS) attack, user to root (U2R) attack, remote to user (R2L) attack and probing attacks. Six types of attacks are
considered: Smurf, Teardrop, Satan, Guest, Warezclient. These six attack types are selected from four different attack
categories (denial of service, probing, user to root and remote to user) to check for the ability of the intrusion detection
system to identify attacks from different categories.
3. System Implementation and Result
The section describes the detailing of the attack detection system as well as the result obtained from it.
3.1 Home page and File Select
Figure 3.1: File Select
Input to system is given in text and arff format. After that data labelling is done. Data is labelled according to normal and
attack packet as +1 and -1 as last bit position.
3.2 MLP Output
Figure 3.3: MLP Output
Volume 3, Issue 4, April 2014
Page 398
International Journal of Application or Innovation in Engineering & Management (IJAIEM)
Web Site: www.ijaiem.org Email: editor@ijaiem.org
Volume 3, Issue 4, April 2014
ISSN 2319 - 4847
Table is shown with output count and categories of attacks.
3.4 Detection
Figure 3.4: Detection
Table is shown with Detection rate, false positive alarm rate and false negative alarm rate.
3.5 Detection Chart
Figure 3.5: Detection Chart
Chart shows percentage of detection rate of attacks and false alarm.
X axis: Poles of Detection and False alarm.
Y axis: Percentage rate
3.6 Real time detection
Figure 3.6:Real time Detection
Volume 3, Issue 4, April 2014
Page 399
International Journal of Application or Innovation in Engineering & Management (IJAIEM)
Web Site: www.ijaiem.org Email: editor@ijaiem.org
Volume 3, Issue 4, April 2014
ISSN 2319 - 4847
System detects the attack from another system which pings to home system.
4. Conclusion
Using Artificial Neural Network we have designed Network Intrusion Detection System. There is use of Multi-Layer
Perceptron for learning purpose and Aprori Algorithm for rule creation. By end we able to detect and classify attack into
Denial of Service (DoS), Probe, User to Root(U2R), Remote to User(R2L) categories with greater efficiency.
Acknowledgement
This research paper cannot be considered complete without mentioning Prof. Dr. A. P. Adsul. We wish to express true
sense of gratitude towards her valuable contribution .We are grateful to her for constant encouragement and guidance in
the fulfilment of this activity.
References
[1] James Cannady, “Artificial neural networks for misuse detection”, Proceedings of the 1998 National Systems
Security Conference (NISSC’98), Arlington, VA, 1998.
[2] J. Ryan, M. Lin, and R. Miikulainen, “Intrusion Detection with Neural Networks”, AI Approaches to Fraud and Risk
Management: Papers from the 1997 AAAI Workshop, Providence, pp.72-79, 1997.
[3] Srinivas Mukkamala, “Intrusion Detection using neural Networks and support vector machine”, Proceedings of the
2002 IEEE International Honolulu, HI, 2002.
[4] Mukherjee B., Heberlein L.T., Levitt K.N., “Network Intrusion Detection”. IEEE Network. Pp.28-42, 1994.
[5] Kabiri P., Ghorbani A. “A Research in intrusion detection and response – a survey”. International Journal of
Network Security, 2005.
[6] Helman P., Ghorbani A. “A Research in intrusion Detection “In Proceedings of the Fifth Computer Security
Foundations Workshop pp.114-120, 1992.
[7] Anderson D.,Frivold T.,Valdes “Next Generation Intrusion Detection Expert System (NIDES) A Summary”. SRI
International Technical Report SRI-CSL-95-07,1995.
[8] P. Garcia-Teodoroa., J. Diaz-Verdejoa., G. Macia-Fernandeza., E. Vazquezb. “Anomaly based network Intrusion
Detection: Techniques, systems and Challenges” Elsevier, 2009.
[9] Sergios Theodorios and Konstantinos Koutroumbas “Pattern Recognition” Cambridge: Academic press 1999.
[10] http://www.sigkdd.org/kddcup/index.php?section=1999andmethod=task
[11] Mohommad Reza Norouzian, Sobhan Merati “Classifying Attacks in Network Intrusion Detection System Based on
Artificial Neural Network” at ICACT, 2011.
Volume 3, Issue 4, April 2014
Page 400
Download