An Optimized Feature Selection for Intrusion Detection using Layered Conditional Random Fields with MAFS

Saravanan, C.; Shivsankar, M. V.; Selvy, P. Tamije; Anto, S.
June 2012
International Journal of Mobile Network Communications & Telemat;Jun2012, Vol. 2 Issue 3, p79
Academic Journal
Intrusion Detection systems are now an essential component in the overall network. With the rapid advancement in the network technologies including higher bandwidths and ease of connectivity of wireless and hand held devices, the main focus of intrusion detection has shifted from simple signature matching approaches to detecting attacks based on analyzing contextual information which may be specific to individual networks and applications. As a result, anomaly and hybrid intrusion detection approaches have gained significance. The Denial of Service Attacks (DoS), Probe, User to Root (U2R) and Remote to Local (R2L) are some of the common attacks that affect network resources. Intrusion detection faces a number of challenges; an intrusion detection system must reliably detect malicious activities in a network and cope up with large amount of network traffic. In this paper, we address these two issues of Accuracy and Efficiency using Conditional Random Fields and Layered Approach. Finally we demonstrate that high attack detection accuracy can be achieved by using Memetic algorithm for feature selection with Layered Conditional Random Fields.


Related Articles

  • An Intrusion Prevention Mechanism in Mobile Ad Hoc Networks. PING YI; TING ZHU; JIANQING MA; YUE WU // Adhoc & Sensor Wireless Networks;2013, Vol. 17 Issue 3/4, p269 

    Mobile ad hoc networks (MANETs) are vulnerable to attacks with dynamic change of topology and unreliable wireless communication. Intrusion detection systems (IDSs) are important in MANETs to effectively identify an intruder. Then, IDS may broadcast the blacklist to all nodes in network. This...

  • A ROLE OF INTRUSION DETECTION SYSTEM FOR WIRELESS LAN USING VARIOUS SCHEMES AND RELATED ISSUES. Ethala, Kamalanaban; Seshadri, R.; Renganathan, N. G.; Saravanan, M. S. // American Journal of Applied Sciences;Sep2013, Vol. 10 Issue 9, p979 

    The advancement in network based technology and augmented dependability of our everyday life on this technology. During recent years, number of attacks on networks has intensely increased. Hence interest in network intrusion detection has increased among the researchers. This study assesses...

  • SECURING WMN USING HYBRID HONEYPOT SYSTEM. Rawat, Paramjeet; Goel, Sakshi; Agarwal, Megha; Singh, Ruby // International Journal of Distributed & Parallel Systems;May2012, Vol. 3 Issue 3, p29 

    Wireless Mesh Network (WMN) has been a field of active research in the recent years. Lot of research has focused various routing mechanism but very little effort has been made towards attack detection or intrusion detection. In this paper, we propose an attack detection approach for wireless...

  • SEEDI: Secure and Energy Efficient Approach for Detection of an Intruder in Homogeneous Wireless Sensor Networks. Shaila, K.; Sajitha, M.; Tejaswi, V.; Manjula, S. H.; Venugopal, K. R.; Patnaik, L. M. // International Journal of Computer Theory & Engineering;Dec2012, Vol. 4 Issue 6, p871 

    Wireless Sensor Networks consists of tiny devices which processes and routes the sensed data. The process of detecting any external and internal intruders entering to a Wireless Sensor Network area is referred to as intrusion detection. An intruder is a moving attacker entering a particular...

  • A Survey on Intrusion Detection System for Wireless Network. Mishra, Ajita; Srivastava, Ashish Kumar // International Journal of Computer Applications;Jul2013, Vol. 73 Issue 1-22, p37 

    Security of Wireless network becomes associate in nursing woeful necessary issues with the speedy development of wireless network that is in danger for an honest vary of attacks due to preparation among the hostile atmosphere and having limited resources. Now a day wireless detection network is...

  • Intrusion Detection System Designed for Wireless using JADE Mobile Agent Framework. Sasikumar, R.; Manjula, D. // International Journal of Computer Applications;7/15/2012, Vol. 50, p23 

    In wireless environment the system allows the end users to use the application without installation and access their personal files at any computer with internet access. Apart from the advantages of wireless network, security is the major issue. Due to the distributed nature, wireless...

  • Reach on Wireless Sensor Networks Security Issues and IDS Model. JianGang Tang // Applied Mechanics & Materials;2014, Issue 530-531, p45 

    Security measures could not absolutely prevent network intrusion. The security technology of intrusion detection system had made up for the lack of preventive measures; it could provide real-time intrusion detection and take appropriate protection for network. The research directions of WSN...

  • RGB Technique of Intrusion Detection in IEEE 802.11 Wireless Mesh Networks. Ashraf, M Salman; Raheel, Muhammad // International Journal of Computer Science Issues (IJCSI);Mar2012, Vol. 9 Issue 2, p306 

    According to the growth rate of wireless technology, wireless mesh network (WMN) usage is significantly increased according to its advantages like inexpensive, fast and easy deployment. WMN have ability, easy to create mesh and provide internet access in a cost efficient manner in any type of...

  • A Method of Data Preprocessing for Network Security Situational Awareness Based on Conditional Random Fields. Aiping Lu; Jianping Li // International Proceedings of Computer Science & Information Tech;2012, Vol. 53, p198 

    Network Security Situational Awareness(NSSA) has been a hot research in the network security domain. Because of the large amount of Intrusion Detection System (IDS), We propose a new method of data preprocessing for NSSA based on conditional random fields(CRFs). It takes advantages of the CRFs...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics