DISSERTATION MACHINE LEARNING ALGORITHM DEVELOPMENT TIPS FOR DEVELOPING INTRUSION DETECTION SYSTEM

Page 1

PHD ASSISTANCE Lab

Tips for developing Academically sound IDS Models and algorithms for Your IEEE Publication 2019


EXECUTIVE SUMMARY AI is promising in the of detecting intrusions are cross-site scripting attacks, SQL injections, Denial of Service (DoS), Ransomware, etc. Deep learning models able to accurately predict and recognize “normal activity� or malicious activity faster and generate a much lower per. Real-time IDS systems must not have a single fixed algorithm instead the algorithms must be updated regularly

2

| Machine Learning Models for Intrusion Detection Systems


Introduction: Network Intrusions are unauthorized activities on the organization's local computer network that disrupts the work of targeted user or leads to damage, theft or x of the target. Although systems such as firewall and antivirus have been developed, the weaknesses caused by the architecture are not updated, and new attacks can be created. This led to the development of Intrusion Detection systems (IDS) and Intrusion Prevention Systems (IPS) which have been deployed for many years as a logical combination with one or more firewalls. It is necessary to have a clear understanding of the intrusion since the characteristics of the individual attacks have to be analyzed to detect or block these intrusions . National Institute of Standards and Intrusion Detection System provides a guidance document on IDS. The different types of IDS vary from a single computer to a large network of computers. The IPS system will not only detect the intrusions but also take necessary action to prevent them from taking place. On the other hand, the IDS will not take any action. It merely creates a log that a particular intrusion has taken place. The IPS will restrict the access of the intrusions by limiting the resources, blocking the source IP address, etc.

3

| Machine Learning Models for Intrusion Detection Systems


1

Types of IDS Techniques : There are different types of IDS systems which are network-based (NIDS), host-based intrusion (HIDS) and vulnerability assessment-based (Signature and anomaly-based intrusion detection techniques) IDS systems. A Network Intrusion Detection System (NIDS) analyses and monitors the nodes and network devices for any incoming and outgoing network traffic. The traffic is split into individual packets, and each of these packets analysed and compared with the characteristics of the existing knowledge of intrusions . It also monitors multiple hosts and targets the intrusions without affecting the efficiency of the hosts. A host-based intrusion detection system (HIDS) is a system that monitors the necessary files. It can identify malicious traffic and unusual network packets that were not recognized by the NIDS. The HIDS can run directly both in internet device and also in the local intranet network. HIDS has the ability to separate the malicious traffic from the host . Intrusion Detection and Prevention Systems (IDPS) are a combination of both IDS and IPS. They are just like alarms and can identify the imminent threats that are disguised as ordinary traffic and instantly prevent them from entering the system. The specific technique that was used in this work is not mentioned due to appropriate reasons. The challenges facing these IDPS systems is that hackers are increasingly finding new and adaptive methods to hide their packets, thereby increasing the difficulty of identifying them . Even if one of them gets successful in entering the system, they can create havoc even before getting discovered. The increasing variety

4 | Machine Learning Models for Intrusion Detection Systems


of these attacks does not provide comfort to the IDPS system [5]. The most commonly occurring intrusions are cross-site scripting attacks, SQL injections, Denial of Service (DoS), Ransomware, etc. Each of these attacks works in a completely different way, and hence, the IDPS system must be intelligent and should be able to adapt to the ever dynamic network .

2

Pre-Processing the IDS data: Simulation of IDS for research purposes is usually performed through a dataset (e.g. KDD’99, DARPA dataset, NSD-KDD, KDD-CUP 2002). This dataset must contain the latest real-time intrusion data. The dataset size should be huge, and also balanced (between training and test data) since the training of the classifiers will be more effective if the data is extensive and balanced. This can be useful since efficient training means better prevention of intrusions in real-time traffic. Feature selection also plays a significant role as it makes it easier to categorize, reduce operation time and improves classification performance and accuracy. Appropriate pre-processing techniques should be selected. Mostdatasets require various pre-processing like filling in the missing values, outliers, etc. After the data is adequately cleaned, feature extraction is required. This should be done since the dataset might contain lots of unnecessary features that will not be of any use in the classification. However, its presence might increase the computational time; hence, only the necessary elements must be selected. A novel intelligent technique must be identified from the gap for extracting the features which can combine two more previously available techniques or a completely new algorithm can be built.

5 | Machine Learning Models for Intrusion Detection Systems


3

IDS Classification Algorithms: Methods and Approaches Although artificial intelligence / deep learning models able to accurately predict and recognize “normal activity� or malicious activity faster and generate a much lower percentage of false positives, along with-it researchers also recommend hybrid approaches. A novel combination of intelligent techniques must be obtained by incorporating machine learning (ML) algorithm [Artificial Neural Networks] such as Bayesian networks, neural networks, fuzzy logic, Support Vector Machines (SVM), Multivariate Adaptive Regression Splines (MARS), and Linear Genetic Programming Algorithms, statistical anomaly detection algorithms (such as statistical moment, mathematical modeling, operational model, time-series, multivariate model, Markova models) Data mining Algorithms (e.g., frequent pattern mining, classification, association rule discovery, mining data streams, and classification) and knowledge-based detection (e.g. state transition analysis, expert systems, signature analysis, Petri Net). The recent example of such algorithm is The Amazon SageMaker IP Insights, is an unsupervised algorithm that uses statistical modelling and neural network to capture associations between IPv4 addresses and online resources (e.g. online bank account)

6 | Machine Learning Models for Intrusion Detection Systems


“

Although artificial intelligence / deep learning models able to accurately predict and recognize malicious activity faster with a lower percentage of false positives, along with-it researchers also recommend hybrid approaches� These algorithms can be implemented parallelly in WEKA, or MATLAB, and then the performance of the model can be compared by evaluating the metrics (e.g. True Positive, False Positive, Precision, F-measure, Receiver Operating Curve ROC Area, the Detection Rate (DR), false alarm rate (FAR) . Otherwise, the algorithms may be stacked in such a way that each one is executed individually one by one and later, all of them work together to improve the accuracy of the detection. Once the malicious packets are identified, they must be prevented from entering the network, and the system should make sure that similar packets do not enter the network.

7 | Machine Learning Models for Intrusion Detection Systems


SUMMARY Building an IDS is extremely challenging since lots of algorithms and machine learning techniques are involved in it, thereby increasing its complexity. The age of the data also increases complexity. Older datasets contain old data which can be easily prevented by the newer IDP systems. However, more modern datasets contain new data and attacks, and thus, the complexity is increased. Unlike other security systems, real-time IDS systems must not have a single fixed algorithm. Instead, the algorithms must be updated regularly, and newer and more efficient algorithms must be updated in the system. This is because the intrusions are usually modernized and periodically updated by the hackers. Keeping the system in a constant update will improve the accuracy and reduce the error rates.

8 | Machine Learning Models for Intrusion Detection Systems


REFERENCES [1] N. Subramanian and A. Jeyaraj, “Recent security challenges in cloud computing,” Comput. Electr. Eng., vol. 71, pp. 28–42, Oct. 2018. [2] Z. Zhang and A. Meddahi, “Intrusion Prevention and Detection in NFV,” in Security in Network Functions Virtualization, Elsevier, 2017, pp. 157–172. [3] S. K. Gautam and H. Om, “Computational neural network regression model for Host-based Intrusion Detection System,” Perspect. Sci., vol. 8, pp. 93–95, Sep. 2016. [4] L. Coppolino, S. D’Antonio, G. Mazzeo, and L. Romano, “Cloud security: Emerging threats and current solutions,” Comput. Electr. Eng., vol. 59, pp. 126–140, Apr. 2017. [5] R. Walters, “Cyber Attacks on U.S. Companies in 2016,” Herit. Found. Issue Br., vol. No. 4636, no. December, pp. 1–5, 2016. [6] H. M. Alsafi, W. M. Abdullah, and A.-S. K. Pathan, “IDPS: An Integrated Intrusion Handling Model for Cloud,” 2012.

© 2019-2020 All Rights Reserved, No part of this document should be modified/used without prior consent UK: 10 Park Place, Manchester M4 4EY, UK: +44-1143520021 Email:info@phdassistance.com, Web:www.phdassistance.com.

ABOUT PHD ASSISTANCE PhD Assistance, is world’s reputed academic guidance provider for the past 15 years have guided more than 4,500 Ph.D. scholars and 10,500 Masters Students across the globe. We support students, research scholars, entrepreneurs, and professionals from various organizations in providing consistently high-quality writing and data analytical services every time. We value every client and make sure their requirements are identified and understood by our specialized professionals and analysts, enriched in experience to deliver technically sound output within the requested timeframe. Writers at PhD Assistance are best referred as 'Researchers' since every topic they handle unique and challenging. We specialize in handling text and data, i.e., content development and Statistical analysis where the latest statistical applications are exhausted by our expert analysts for determining the outcome of the data analysed. Qualified and experienced researchers including Ph.D. holders, statisticians, and research analysts offer cutting edge research consulting and writing services to meet your business information or academic project requirement. Our expertise has passion towards research and personal assistance as we work closely with you for a very professional and quality output within your stipulated time frame. Our services cover vast areas, and we also support either part or entire research paper/service as per your requirement at competitive prices.


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.