ANFIS Classifier for Network Intrusion Detection System دكترمحسن كاهاني http://www.um.ac.ir/~kahani/ Network Intrusion Detection Widespread use of computer networks Number of attacks and New hacking tools and Intrusive methods An Intrusion Detection System (IDS) is one way of dealing with suspicious activities within a network. IDS Monitors the activities of a given environment Decides whether these activities are malicious (intrusive) or legitimate (normal). دكتر كاهاني-سيستمهاي خبره و مهندسي دانش Soft Computing and IDS Many soft computing approaches have been applied to the intrusion detection field. Our Novel Network IDS includes Neuro-Fuzzy Fuzzy Genetic algorithms Key Contributions Utilization of outputs of neuro-fuzzy network as linguistic variables which expresses how reliable current output is. دكتر كاهاني-سيستمهاي خبره و مهندسي دانش KDD cup 99 Dataset Comparison of different works in IDS area Needs of Standard dataset for evaluation of computer network IDSes. Fifth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining Collected and generated TCP dump data of simulated network in the form of train-and-test sets of features defined for the connection records. We name this standard Dataset as KDD cup 99 dataset and will use it for our experiments. دكتر كاهاني-سيستمهاي خبره و مهندسي دانش KDD cup 99 Dataset 41 features derived for each connection. A label which specifies the status of connection records as either normal or specific attack type. Features fall in four categories The intrinsic features e.g. duration of the connection , type of the protocol (tcp, udp, etc), network service (http, telnet, etc), etc. The content feature e.g. number of failed login attempts etc. The same host features examine established connections in the past two seconds that have the same destination host as the current connection, and calculate statistics related to the protocol behavior, service, etc The similar same service features examine the connections in the past two seconds that have the same service as the current connection. دكتر كاهاني-سيستمهاي خبره و مهندسي دانش Basic features of individual TCP connections feature name description type duration length (number of seconds) of the connection continuous protocol_type type of the protocol, e.g. tcp, udp, etc. discrete service network service on the destination, e.g., http, telnet, etc. discrete src_bytes number of data bytes from source to destination continuous dst_bytes number of data bytes from destination to source continuous flag normal or error status of the connection discrete land 1 if connection is from/to the same host/port; 0 otherwise discrete wrong_fragment number of ``wrong'' fragments continuous urgent number of urgent packets continuous دكتر كاهاني-سيستمهاي خبره و مهندسي دانش Content features within a connection suggested by domain knowledge feature name description type hot number of ``hot'' indicators continuous num_failed_logins number of failed login attempts continuous logged_in 1 if successfully logged in; 0 otherwise discrete num_compromised number of ``compromised'' conditions continuous root_shell 1 if root shell is obtained; 0 otherwise discrete su_attempted 1 if ``su root'' command attempted; 0 otherwise discrete num_root number of ``root'' accesses continuous num_file_creations number of file creation operations continuous num_shells number of shell prompts continuous num_access_files number of operations on access control files continuous num_outbound_cmds number of outbound commands in an ftp session continuous is_hot_login 1 if the login belongs to the ``hot'' list; 0 otherwise discrete is_guest_login 1 if the login is a ``guest''login; 0 otherwise discrete دكتر كاهاني-سيستمهاي خبره و مهندسي دانش Traffic features computed using a two-second time window feature name description type count number of connections to the same host as the current connection in the past two seconds continuous Note: The following features refer to these same-host connections. serror_rate % of connections that have ``SYN'' errors continuous rerror_rate % of connections that have ``REJ'' errors continuous same_srv_rate % of connections to the same service continuous diff_srv_rate % of connections to different services continuous srv_count number of connections to the same service as the current connection in the past two seconds continuous Note: The following features refer to these same-service connections. srv_serror_rate % of connections that have ``SYN'' errors continuous srv_rerror_rate % of connections that have ``REJ'' errors continuous srv_diff_host_rate % of connections to different host continuous دكتر كاهاني-سيستمهاي خبره و مهندسي دانش KDD CUP 99 Sample Data 0,tcp,http,SF,200,4213,0,0,0,0,0,1,0,0,0,0,0,0,0,0,0,0,15,15,0.00,0.00,0.00,0.00,1.00,0.00,0.00,31,255,1.00,0.00,0.03,0.02,0. 00,0.00,0.00,0.00,normal. 0,tcp,http,SF,293,4203,0,0,0,0,0,1,0,0,0,0,0,0,0,0,0,0,2,2,0.00,0.00,0.00,0.00,1.00,0.00,0.00,4,255,1.00,0.00,0.25,0.02,0.00,0.00,0.00,0.00,normal. 0,tcp,http,SF,296,6903,0,0,0,0,0,1,0,0,0,0,0,0,0,0,0,0,1,2,0.00,0.00,0.00,0.00,1.00,0.00,1.00,2,255,1.00,0.00,0.50,0.03,0.00,0.00,0.00,0.00,normal. 0,udp,domain_u,SF,104,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,1,2,0.00,0.00,0.00,0.00,1.00,0.00,1.00,56,56,1.00,0.00,1.00,0.00,0.00,0.00,0.00,0.00,normal. 0,udp,domain_u,SF,103,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,1,2,0.00,0.00,0.00,0.00,1.00,0.00,1.00,66,66,1.00,0.00,1.00,0.00,0.00,0.00,0.00,0.00,normal. 0,udp,domain_u,SF,89,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,1,2,0.00,0.00,0.00,0.00,1.00,0.00,1.00,76,76,1.00,0.00,1.00,0.00,0.00,0.00,0.00,0.00,normal. 0,udp,domain_u,SF,79,32,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,1,1,0.00,0.00,0.00,0.00,1.00,0.00,0.00,86,85,0.99,0.02,0.99,0.00,0.00,0.00,0.00,0.00,normal. 0,tcp,smtp,SF,1367,335,0,0,0,0,0,1,0,0,0,0,0,0,0,0,0,0,1,1,0.00,0.00,0.00,0.00,1.00,0.00,0.00,21,72,0.90,0.10,0.05,0.04,0.00,0.00,0.00,0.00,normal. 184,tcp,telnet,SF,1511,2957,0,0,0,3,0,1,2,1,0,0,1,0,0,0,0,0,1,1,0.00,0.00,0.00,0.00,1.00,0.00,0.00,1,3,1.00,0.00,1.00,0.67,0.00,0.00,0.00,0.00,buffer_overflow. 305,tcp,telnet,SF,1735,2766,0,0,0,3,0,1,2,1,0,0,1,0,0,0,0,0,1,1,0.00,0.00,0.00,0.00,1.00,0.00,0.00,2,4,1.00,0.00,0.50,0.50,0.00,0.00,0.00,0.00,buffer_overflow. 0,tcp,smtp,SF,1518,405,0,0,0,0,0,1,0,0,0,0,0,0,0,0,0,0,1,4,0.00,0.00,0.00,0.00,1.00,0.00,1.00,42,108,0.74,0.07,0.02,0.04,0.05,0.00,0.00,0.00,normal. 0,tcp,smtp,SF,1173,403,0,0,0,0,0,1,0,0,0,0,0,0,0,0,0,0,1,1,0.00,0.00,0.00,0.00,1.00,0.00,0.00,52,116,0.75,0.06,0.02,0.03,0.04,0.00,0.00,0.00,normal. 257,tcp,telnet,SF,181,1222,0,0,0,0,0,1,0,0,0,0,2,0,0,0,0,0,1,1,0.00,0.00,0.00,0.00,1.00,0.00,0.00,62,15,0.21,0.05,0.02,0.13,0.03,0.13,0.00,0.00,normal. 0,tcp,smtp,SF,2302,410,0,0,0,0,0,1,0,0,0,0,0,0,0,0,0,0,1,1,0.00,0.00,0.00,0.00,1.00,0.00,0.00,72,117,0.76,0.04,0.01,0.03,0.03,0.00,0.00,0.00,normal. 1,tcp,smtp,SF,1587,332,0,0,0,0,0,1,0,0,0,0,0,0,0,0,0,0,1,1,0.00,0.00,0.00,0.00,1.00,0.00,0.00,3,120,1.00,0.00,0.33,0.04,0.00,0.00,0.00,0.00,normal. 0,tcp,smtp,SF,1552,333,0,0,0,0,0,1,0,0,0,0,0,0,0,0,0,0,1,2,0.00,0.00,0.00,0.00,1.00,0.00,1.00,13,121,0.85,0.15,0.08,0.04,0.00,0.00,0.00,0.00,normal. 0,tcp,finger,SF,10,223,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,1,1,0.00,0.00,0.00,0.00,1.00,0.00,0.00,23,14,0.22,0.13,0.04,0.29,0.00,0.00,0.00,0.00,normal. 0,tcp,smtp,SF,971,335,0,0,0,0,0,1,0,0,0,0,0,0,0,0,0,0,1,1,0.00,0.00,0.00,0.00,1.00,0.00,0.00,16,120,0.94,0.12,0.06,0.03,0.00,0.00,0.00,0.00,normal. 1,tcp,smtp,SF,2007,335,0,0,0,0,0,1,0,0,0,0,0,0,0,0,0,0,1,3,0.00,0.00,0.00,0.00,1.00,0.00,1.00,26,129,0.92,0.12,0.04,0.03,0.00,0.00,0.00,0.00,normal. 0,tcp,finger,SF,8,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,1,1,0.00,0.00,0.00,0.00,1.00,0.00,0.00,3,16,0.67,0.67,0.33,0.31,0.00,0.00 ,0.00,0.00,normal. 0,tcp,smtp,SF,880,327,0,0,0,0,0,1,0,0,0,0,0,0,0,0,0,0,1,1,0.00,0.00,0.00,0.00,1.00,0.00,0.00,18,195,0.89,0.11,0.06,0.03,0.00,0.00,0.00,0.00,normal. 0,tcp,smtp,SF,4031,322,0,0,0,0,0,1,0,0,0,0,0,0,0,0,0,0,1,1,0.00,0.00,0.00,0.00,1.00,0.00,0.00,28,205,0.93,0.07,0.04,0.03,0.00,0.00,0.00,0.00,normal. 27,tcp,ftp,SF,916,2720,0,0,0,19,0,1,0,0,0,0,0,0,0,0,0,1,2,2,0.00,0.00,0.00,0.00,1.00,0.00,0.00,5,5,1.00,0.00,0.20,0.00,0.00,0.00,0.00,0.00,normal. 0,tcp,smtp,SF,2012,325,0,0,0,0,0,1,0,0,0,0,0,0,0,0,0,0,1,1,0.00,0.00,0.00,0.00,1.00,0.00,0.00,15,207,0.27,0.13,0.07,0.03,0.00,0.00,0.00,0.00,normal. 20,tcp,ftp,SF,239,774,0,0,0,4,0,1,0,0,0,0,0,0,0,0,0,1,1,1,0.00,0.00,0.00,0.00,1.00,0.00,0.00,55,34,0.62,0.04,0.02,0.00,0.00,0.00,0.00,0.00,normal. 23,tcp,ftp,SF,342,1072,0,0,0,6,0,1,0,0,0,0,0,0,0,0,0,1,1,1,0.00,0.00,0.00,0.00,1.00,0.00,0.00,65,40,0.62,0.03,0.02,0.00,0.00,0.00,0.00,0.00,normal. 1,tcp,smtp,SF,1609,364,0,0,0,0,0,1,0,0,0,0,0,0,0,0,0,0,1,4,0.00,0.00,0.00,0.00,1.00,0.00,1.00,75,187,0.37,0.03,0.01,0.03,0.00,0.00,0.00,0.00,normal. 21,tcp,ftp,SF,227,766,0,0,0,4,0,1,0,0,0,0,0,0,0,0,0,1,1,1,0.00,0.00,0.00,0.00,1.00,0.00,0.00,85,50,0.59,0.02,0.01,0.00,0.00,0.00,0.00,0.00,normal. 0,tcp,http,SF,54540,8314,0,0,0,2,0,1,1,0,0,0,0,0,0,0,0,0,2,2,0.00,0.00,0.00,0.00,1.00,0.00,0.00,111,111,1.00,0.00,0.01,0.00,0 .00,0.00,0.01,0.01,back. 0,tcp,http,RSTR,53452,2920,0,0,0,1,0,1,0,0,0,0,0,0,0,0,0,0,3,3,0.00,0.00,0.33,0.33,1.00,0.00,0.00,112,112,1.00,0.00,0.01,0.00 ,0.00,0.00,0.02,0.02,back. 0,tcp,http,SF,54540,8314,0,0,0,2,0,1,1,0,0,0,0,0,0,0,0,0,3,3,0.00,0.00,0.33,0.33,1.00,0.00,0.00,113,113,1.00,0.00,0.01,0.00,0 .00,0.00,0.02,0.02,back. 0,icmp,ecr_i,SF,1480,0,0,1,0,0,0,0,0,0,0,0,0,0,0,0,0,0,19,19,0.00,0.00,0.00,0.00,1.00,0.00,0.00,255,19,0.07,0.02,0.07,0.00,0.00,0.00,0.00,0.00,pod. 0,icmp,ecr_i,SF,1480,0,0,1,0,0,0,0,0,0,0,0,0,0,0,0,0,0,20,20,0.00,0.00,0.00,0.00,1.00,0.00,0.00,255,20,0.08,0.02,0.08,0.00,0.00,0.00,0.00,0.00,pod. 0,tcp,private,RSTR,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,1,1,0.00,0.00,1.00,1.00,1.00,0.00,0.00,255,1,0.00,0.02,0.00,0.00,0.00,0.00,0.00,1.00,portsweep. دكتر كاهاني-سيستمهاي خبره و مهندسي دانش KDD cup 99 Dataset Attacks fall into four main categories DOS (Denial of service): making some computing or memory resources too busy so that they deny legitimate users access to these resources. R2L (Root to local): unauthorized access from a remote machine according to exploit machine's vulnerabilities. U2R (User to root): unauthorized access to local super user (root) privileges using system's susceptibility. PROBE: host and port scans as precursors to other attacks. An attacker scans a network to gather دكتر كاهاني-سيستمهاي خبره و مهندسي دانش information or find known vulnerabilities. KDD Cup 99 Dataset cont. KDD dataset is divided into following record sets: Training Testing Original training dataset was too large for our purpose10% training dataset, was employed here for training phase. دكتر كاهاني-سيستمهاي خبره و مهندسي دانش KDD Cup 99 Sample Distribution THE SAMPLE DISTRIBUTIONS ON THE SUBSET OF 10% DATA OF KDD CUP 99 DATASET Class Number of Samples Samples Percent Normal Probe DoS U2R R2L 97277 4107 391458 52 1126 19.69% 0.83% 79.24% 0.01% 0.23% 492021 100% THE SAMPLE DISTRIBUTIONS ON THE TEST DATA WITH THE CORRECTED LABELS OF KDD CUP 99 DATASET Class Number of Samples Samples Percent Normal Probe DoS U2R R2L 60593 4166 229853 228 16189 311029 19.48% 1.34% 73.90% 0.07% 5.20% 100% دكتر كاهاني-سيستمهاي خبره و مهندسي دانش ANFIS ANFIS as an adaptive neuro-fuzzy inference system Ability to construct models solely based on the target system sample (Learning) Adopt itself through repeated training (Adaptation) Above abilities among others qualifies ANFIS as a fuzzy classifier for IDS Here we use ANFIS as Neuro-fuzzy classifier to detect intrusions in computer networks based on KDD cup 99 datasets. دكتر كاهاني-سيستمهاي خبره و مهندسي دانش Generating Target fuzzy Inference System Grid partitioning all the possible rules are generated based on the number of MFs for each input For example in a two dimensional input space, with three MFs in the input sets, the number of rules in grid partitioning will result in 9 rules. Subtractive clustering Subtractive Clustering is a fast, one-pass algorithm for estimating the number of clusters and the cluster centers in a set of data. The clusters’ information obtained by this method is used for determining the initial number of rules and antecedent membership functions, which is used for identifying the FIS. دكتر كاهاني-سيستمهاي خبره و مهندسي دانش Initial SYSTEM ARCHITECTURE Features of KDD had all forms continuous, discrete, and symbolic. Preprocessing: mapping symbolic valued attributes to numeric ones. 150000 randomly selected points of the subset of 10% of data is used as training. Randomly 40000 records of data selected as the checking data (used for validating model). Five trails of 40000 sampled connections from the source of training dataset that does not overlap neither with training set nor each others, have been carried out as the testing data. دكتر كاهاني-سيستمهاي خبره و مهندسي دانش Initial SYSTEM ARCHITECTURE Subtractive Clustering Method with ra=0.5 (neighborhood radius) partitions the training data and generates an FIS structure. Then for further fine-tuning and adaptation of membership functions, training dataset was used for training ANFIS while the checking dataset was used for validating the model identified. The final ANFIS contains 212 nodes and a total number of 284 fitting parameters, of which 164 are premise parameters and 84 are consequent parameters. دكتر كاهاني-سيستمهاي خبره و مهندسي دانش Initial SYSTEM ARCHITECTURE Training ANFIS causes further fine-tuning and adaptation of initial membership functions. Initial and final membership functions of some input features are illustrated here. دكتر كاهاني-سيستمهاي خبره و مهندسي دانش Initial SYSTEM ARCHITECTURE ANFIS structure has one output, basically. We need to gain an approximate class number by rounding off the output number of ANFIS. Γ is the parameter for rounding off which gives us the integer value. دكتر كاهاني-سيستمهاي خبره و مهندسي دانش Standard metrics for evaluating network IDSes Some Definition Detection rate is computed as the ratio between the number of correctly detected attacks and the total number of attacks, False alarm (false positive) rate is computed as the ratio between the number of normal connections that is incorrectly misclassified as attacks and the total number of normal connections. Classification rate is defined as ratio between number of test instances correctly classified and the total number of test instances classified. دكتر كاهاني-سيستمهاي خبره و مهندسي دانش Results False Alarm, Detection and classification rate for training and checking data, Γ=0.5 Data False Alarm Rate% Detection Rate% Classification Rate% Training 0.61 99.75 99.68 Checking 1.6 91.00 92.44 Error measures vs. epoch numbers for the training dataset دكتر كاهاني-سيستمهاي خبره و مهندسي دانش Results Experiment 1 All the records of labeled test dataset (corrected) as the testing data to evaluate our classifiers False Alarm, Detection and Classification Rate for test data of first experiment; Γ=0.5 Data False Alarm Rate % Detection Rate% Classification Rate% Test 1.6 91.07 92.48 دكتر كاهاني-سيستمهاي خبره و مهندسي دانش Results Experiment 2 5 trials of 40000 randomly selected 40000 samples. Average of the resulting. We compare our classifiers with different fuzzy algorithms. Comparing False Alarm, Detection and complexity of different algorithms. Algorithm False Alarm Rate% Detection Rate% Complexity Neuro-Fuzzy Classifier 0.59 99.54 O(n) SRPP [1] 3.58 99.08 O(n) EFRID [7] 7 98.96 O(n) RIPPER[5] 2.02 94.26 O(n × log2n) دكتر كاهاني-سيستمهاي خبره و مهندسي دانش Final System architecture سيستمهاي خبره و مهندسي دانش-دكتر كاهاني Proposed System(Data Sources) The distribution of the samples in the two subsets that were used for the training SAMPLE DISTRIBUTIONS ON THE FIRST TRAINING AND CHECKING DATA RANDOMLY SELECTED OF 10% DATA OF KDD CUP 99 DATASET OF 10% DATA OF KDD CUP 99 DATASET ANFIS-N ANFIS-P ANFIS-D ANFIS-U ANFIS-R Training Checking Training Checking Training Checking Training Checking Training Checking Normal 20000 2500 10000 1000 25000 6000 200 100 4000 2000 Probe 4000 107 4000 107 4000 107 50 25 1000 500 DoS 15000 2000 5000 500 20000 5000 50 25 2000 1000 U2R 40 12 40 12 40 12 46 6 40 12 R2L 1000 126 1000 126 1000 126 50 25 1000 126 دكتر كاهاني-سيستمهاي خبره و مهندسي دانش Proposed System(Data Sources) cont. SAMPLE DISTRIBUTIONS ON THE SECOND TRAINING AND CHECKING DATA RANDOMLY SELECTED OF 10% DATA OF KDD CUP 99 DATASET OF 10% DATA OF KDD CUP 99 DATASET ANFIS-N ANFIS-P ANFIS-D ANFIS-U ANFIS-R Training Checking Training Checking Training Checking Training Checking Training Checking Normal 1500 1500 1500 1500 1500 1500 1500 1500 1500 1500 Probe 500 500 500 500 500 500 500 500 500 500 DoS 500 500 500 500 500 500 500 500 500 500 U2R 52 0 52 0 52 0 46 6 52 0 R2L 500 500 500 500 500 500 500 500 500 500 دكتر كاهاني-سيستمهاي خبره و مهندسي دانش Proposed System(ANFIS Classifiers) The subtractive clustering method with ra=0.5 (neighborhood radius) has been used to partition the training sets and generate an FIS structure for each ANFIS. For further fine-tuning and adaptation of membership functions, training sets were used for training ANFIS. Each ANFIS trains at 50 epochs of learning and final FIS that is associated with the minimum checking error has been chosen. All the MFs of the input fuzzy sets were selected in the form of Gaussian functions with two parameters. دكتر كاهاني-سيستمهاي خبره و مهندسي دانش Proposed System(The Fuzzy Decision Module) A five-input, single-output of Mamdani fuzzy inference system Centroid of area defuzzification Each input output fuzzy set includes two MFs All the MFs are Gaussian functions which are specified by four parameters. The output of the fuzzy inference engine, which varies between -1 and 1, Sspecifies how intrusive the current record is, 1 to show completely intrusive and -1 for completely normal FUZZY ASSOCIATIVE MEMORY FOR THE PROPOSED FUZZY INFERENCE RULES High Low - PROBE ¬High High Low DoS ¬High High Low U2R ¬High High Low R2L ¬High High Low Output Normal Normal Attack Attack Attack Attack Attack Normal دكتر كاهاني-سيستمهاي خبره و مهندسي دانش Proposed System(Genetic Algorithm Module) A chromosome consists of 320 bits of binary data. 8 bits of a chromosome determines one parameter out of the four parameters of an MF. دكتر كاهاني-سيستمهاي خبره و مهندسي دانش Proposed System(Some Metrics) Cost Per Example 1 m m CPE CM (i, j ) * C (i, j ) N i 1 j 1 Where CM is a confusion matrix Each column corresponds to the predicted class, while rows correspond to the actual classes. An entry at row i and column j, CM (i, j), represents the number of misclassified instances that originally belong to class i, although incorrectly identified as a member of class j. The entries of the primary diagonal, CM (i,i), stand for the number of properly detected instances. C is a cost matrix As well as CM,Entry C(i,j) represents the cost penalty for misclassifying an instance belonging to class i into class j. N represents the total number of test instances, m is the number of the classes in classification. دكتر كاهاني-سيستمهاي خبره و مهندسي دانش Proposed System(Fitness Function For GA) Two different fitness functions Cost Per Example with equal misclassification costs Actual PROBE DoS U2R R2L Normal 0 1 2 3 4 PROBE 1 0 1 2 2 Predicted DoS 2 2 0 2 2 U2R 2 2 2 0 2 R2L 2 2 2 2 0 Actual cost per examples used for evaluating results of the KDD'99 competition Normal PROBE DoS U2R R2L Normal 0 1 1 1 1 PROBE 1 0 1 1 1 Predicted DoS 1 1 0 1 1 U2R 1 1 1 0 1 R2L 1 1 1 1 0 دكتر كاهاني-سيستمهاي خبره و مهندسي دانش Proposed System(Data Sources For GA) THE SAMPLE DISTRIBUTIONS ON THE SELECTED SUBSET OF 10% DATA OF KDD CUP 99 DATASET FOR THE OPTIMIZATION PROCESS WHICH IS USED BY GA Number of Samples Normal Probe DoS U2R R2L 200 104 200 52 104 دكتر كاهاني-سيستمهاي خبره و مهندسي دانش Results 10 subsets of training data for both series were used for the classifiers. The genetic algorithm was performed three times, each time for one of the five series of selected subsets. Totatally 150 different structures were used and the result is the average of the results of this 150 structures. Two different training datasets for training the classifiers and two different fitness functions to optimize the fuzzy decision-making module were used. ABBREVIATIONS USED FOR OUR APPROACHES Abbreviation ESC-KDD-1 Approach First Training set with fitness function of KDD ESC-EQU-1 First Training set with fitness function of equal misclassification cost ESC-KDD-2 Second Training set with fitness function of KDD ESC-EQU-2 Second Training set with fitness function of equal misclassification cost دكتر كاهاني-سيستمهاي خبره و مهندسي دانش Results cont. CLASSIFICATION RATE, DETECTION RATE(DTR), FALSE ALARM RATE (FA) AND COST PER EXAMPLE OF KDD(CPE) FOR THE DIFFERENT APPROACHES OF ESC-IDS ON THE TEST DATASET WITH CORRECTED LABELS OF KDD CUP 99 DATASET Model ESC-KDD-1 ESC-EQU-1 ESC-KDD-2 ESC-EQU-2 Normal 98.2 98.4 96.5 96.9 Probe 84.1 89.2 79.2 79.1 DoS 99.5 99.5 96.8 96.3 U2R 14.1 12.8 8.3 8.2 R2L 31.5 27.3 13.4 13.1 DTR 95.3 95.3 91.6 88.1 FA 1.9 1.6 3.4 3.2 CPE 0.1579 0.1687 0.2423 0.2493 CLASSIFICATION RATE, DETECTION RATE (DTR), FALSE ALARM RATE (FA) AND COST PER EXAMPLE OF KDD (CPE) FOR THE DIFFERENT ALGORITHMS PERFORMANCES ON THE TEST DATASET WITH CORRECTED LABELS OF KDD CUP 99 DATASET (N/R STANDS FOR NOT REPORTED) Model ESC-IDS RSS-DSS Parzen-Window Multi-Classifier Winner of KDD Runner Up of KDD PNrule Normal 98.2 96.5 97.4 n/r 99.5 99.4 99.5 Probe 84.1 86.8 99.2 88.7 83.3 84.5 73.2 DoS 99.5 99.7 96.7 97.3 97.1 97.5 96.9 U2R 14.1 76.3 93.6 29.8 13.2 11.8 6.6 R2L 31.5 12.4 31.2 9.6 8.4 7.3 10.7 DTR 95.3 94.4 n/r n/r 91.8 91.5 91.1 FA 1.9 3.5 2.6 n/r 0.6 0.6 0.4 CPE 0.1579 n/r 0.2024 0.2285 0.2331 0.2356 0.2371 دكتر كاهاني-سيستمهاي خبره و مهندسي دانش