Volume 2, Issue 2, April 2014, Pages 78 - 90
An Ensemble Approach for Cyber Attack Detection System: A Generic Framework
- Shailendra Singh, Sanjay Silakari
- Corresponding Author
- Shailendra Singh
Available Online 1 April 2014.
- https://doi.org/10.2991/ijndc.2014.2.2.2How to use a DOI?
- Generalized Discriminant Analysis improved Support Vector Machine, C4.5, Cyber Attack Detection System, Hybrid system, Ensemble approach
- Cyber attack detection is based on assumption that intrusive activities are noticeably different from normal system activities and thus detectable. A cyber attack would cause loss of integrity, confidentiality, denial of resources. The fact is that no single classifier is able to give maximum accuracy for all the five classes (Normal, Probe, DOS, U2R and R2L). We have proposed a Cyber Attack Detection System (CADS) and its generic framework, which performs well for all the classes. This is based on Generalized Discriminant Analysis (GDA) algorithm for feature reduction of the cyber attack dataset and an ensemble approach of classifiers for classification of cyber attacks. The ensemble approach of classifiers classifies cyber attack based on the union of the subsets of features. Thus, it can detect a wider range of attacks. The C4.5 and improved Support Vector Machine (iSVM) classifiers are combined as a hierarchical hybrid classifier (C4.5-iSVM) and an ensemble approach combining the individual base classifiers and hybrid classifier for best classification of cyber attacks. The experimental results illustrate that the proposed Cyber Attack Detection System is having higher detection accuracy for the all classes of attacks with minimize training, testing times and false positive alarm.
- Open Access
- This is an open access article distributed under the CC BY-NC license.
Cite this article
TY - JOUR AU - Shailendra Singh AU - Sanjay Silakari PY - 2014 DA - 2014/04 TI - An Ensemble Approach for Cyber Attack Detection System: A Generic Framework JO - International Journal of Networked and Distributed Computing SP - 78 EP - 90 VL - 2 IS - 2 SN - 2211-7946 UR - https://doi.org/10.2991/ijndc.2014.2.2.2 DO - https://doi.org/10.2991/ijndc.2014.2.2.2 ID - Singh2014 ER -