A Comparative Approach for Host Based Intrusion Detection Using Naiyve Bayes and KNN Algorithm

Authors

  • Pushpendra Chaturvedi Lecturer, SOS in Computer Science and Application, Jiwaji University, Gwalior, Madhya Pradesh, India

Keywords:

Intrusion detection, K-NN, Naïve - Bayes

Abstract

Despite the existence of various types of network intrusion detection system, growth of attacks at host level has increased in the present time. Therefore, there is a huge potential of research in this field and which motivates this research work. This paper analyses the pattern of four classes of attacks used to deploy host-based intrusion. KNN and Naïve-Bayes algorithms are employed and compared in this research work to determine the presence of intrusion using standard measures of performance.

References

Glenn M. Fung and O. L. Mangasarian, "Multicategory Proximal Support Vector Machine Classifiers", Springer Science and Business Media, Machine Learning, 59, 77–97, 2005.

R. Sahani, C. Rout, J. Chandrakanta Badajena, A. K. Jena, and H. Das, "Classification of intrusion detection using data mining techniques," in Progress in Computing, Analytics and Networking: Proceedings of ICCAN 2017, pp. 753-764, Springer Singapore, 2018.

K. Goeschel, "Reducing false positives in intrusion detection systems using data-mining techniques utilizing support vector machines, decision trees, and naive Bayes for off-line analysis," in SoutheastCon 2016, pp. 1-6, IEEE, March 2016.

V. K. Kshirsagar, S. M. Tidke, and S. Vishnu, "Intrusion detection system using genetic algorithm and data mining: An overview," International Journal of Computer Science and Informatics ISSN (PRINT), vol. 2231, no. 5292, 2012.

D. Y. Yeung and Y. Ding, "Host-based intrusion detection using dynamic and static behavioral models," Pattern recognition, vol. 36, no. 1, pp. 229-243, 2003.

Y. Shin and K. Kim, "Comparison of anomaly detection accuracy of host-based intrusion detection systems based on different machine learning algorithms," International Journal of Advanced Computer Science and Applications, vol. 11, no. 2, 2020.

P. Ramprakash, M. Sakthivadivel, N. Krishnaraj, and J. Ramprasath, "Host-based intrusion detection system using sequence of system calls," International Journal of Engineering and Management Research (IJEMR), vol. 4, no. 2, pp. 241-247, 2014.

X. Xu and T. Xie, "A reinforcement learning approach for host-based intrusion detection using sequences of system calls," in Advances in Intelligent Computing: International Conference on Intelligent Computing, ICIC 2005, Hefei, China, August 23-26, 2005, Proceedings, Part I, pp. 995-1003, Springer Berlin Heidelberg, 2005.

S. K. Singh, N. Chaurasia, and P. Sharma, "Concept and proposed architecture of Hybrid Intrusion Detection System using data mining," International Journal of Engineering and Advanced Technology (IJEAT), vol. 2, pp. 274-276, 2013.

M. Almseidin, J. Al-Sawwa, and M. Alkasassbeh, "Generating a Benchmark Cyber Multi-Step Attacks Dataset for Intrusion Detection," pp. 3679 – 3694, 1 Jan. 2022.

CITES THIS ARTICLE AS

Downloads

Published

2024-03-30

How to Cite

[1]
P. Chaturvedi, “A Comparative Approach for Host Based Intrusion Detection Using Naiyve Bayes and KNN Algorithm”, IJIRCST, vol. 12, no. 2, pp. 87–90, Mar. 2024.

Similar Articles

<< < 1 2 3 

You may also start an advanced similarity search for this article.