Performance analysis of an Intrusion Detection System using Panjab University Intrusion DataSet

Raman Singh, Harish Kumar, R.K. Singla

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

3 Citations (Scopus)

Abstract

Intrusion Detection System (IDS) can be used to detect malware by its network activities or behavioral profiles. Common challenges for IDS are large amount of data to process, low detection rate and high rate of false alarms. Online Sequential Extreme Learning Machine (OS-ELM) based IDS with network traffic profiling is tested on Panjab University - Intrusion DataSet (PU-IDataSet). This IDS is known as alpha-FST-Beta IDS. The training connections are first categorized on the basis of protocol and service features. This categorization is named as alpha profiling. It increases the scalability and reduces the time complexity of IDS. Large feature set of network traffic dataset is reduced using ensemble of three feature selection techniques. Beta profiling is used to reduce the size of training dataset. Various parameters like accuracy, true positive rate, false positive rate, true negative rate, false negative rate, precision, F1-score and detection time is used to evaluate the performance. The results obtained encourage the integration of this system in intrusion detection models.
Original languageEnglish
Title of host publication2015 2nd International Conference on Recent Advances in Engineering and Computational Sciences (RAECS)
Place of PublicationPiscataway, NJ
PublisherIEEE
Number of pages6
ISBN (Electronic)9781467382533
ISBN (Print)9781467382526
DOIs
Publication statusPublished - 19 Apr 2016
Externally publishedYes
Event2015 2nd International Conference on Recent Advances in Engineering & Computational Sciences - Chandigarh, India
Duration: 21 Dec 201522 Dec 2015

Conference

Conference2015 2nd International Conference on Recent Advances in Engineering & Computational Sciences
Abbreviated titleRAECS 2015
Country/TerritoryIndia
CityChandigarh
Period21/12/1522/12/15

Keywords

  • intrusion detection system
  • network traffic profiling
  • sampling
  • feature selection technique
  • inline sequential extreme learning machine
  • PU-IDataSet

Fingerprint

Dive into the research topics of 'Performance analysis of an Intrusion Detection System using Panjab University Intrusion DataSet'. Together they form a unique fingerprint.

Cite this