Previous [ 1] [ 2] [ 3] [ 4] [ 5] [ 6] [ 7] [ 8] [ 9] [ 10] [ 11] [ 12] [ 13] [ 14] [ 15] [ 16] [ 17] [ 18] [ 19]

@

Journal of Information Science and Engineering, Vol. 22 No. 6, pp. 1447-1464 (November 2006)

Effective Intrusion Detection Model through the Combination of a Signature-based Intrusion Detection System and a Machine Learning-based Intrusion Detection System*

Ill-Young Weon, Doo Heon Song+ and Chang-Hoon Lee
Department of Computer Science and Engineering
Konkuk University
Seoul 143-701, Korea
E-mail: {clcc; chlee}@konkuk.ac.kr
+Department of Computer Game and Information
Yong-In SongDam Colleage
5771 Mapyong Dong Young-In Kyungki, Korea
E-mail: dsong@ysc.ac.kr

In the field of network intrusion detection, both the signature-based intrusion detection system and the machine learning-based intrusion detection system possess advantages and disadvantages. When the two discrepant systems are combined in a way that the former is used as the main system and the latter as a supporting system, the machine learning-based intrusion detection system measures the validity of alarms determined by the signature-based intrusion detection system and filters out any false alarms. What is more, such an approach can also detect attacks that the signature-based system by itself cannot detect. The objective of this paper is to propose a combined model of the signature-based and machine learning-based intrusion detection systems and to show that the combined system is more efficient than each individual system. We used the DARPA Data Set in experiments in order to show the usefulness of the combined model. Snort was used for the experiment as a signature-based intrusion detection system and extended IBL (Instance- based Learner) was used as the principal learning algorithm for the machine learning-based intrusion detection system. To compare performances of the algorithms, C4.5 was used.

Keywords: network intrusion detection system, machine learning, combined model, false alarm, detection of new attack, instance-based learner

Full Text () Retrieve PDF document (200611_09.pdf)

Received October 8, 2004; revised May 5, 2005; accepted June 8, 2005.
Communicated by Ja-Ling Wu.
* This research was supported by the Ministry of Information and Communication (MIC), Korea, under the Information Technology Research Center (ITRC) support program supervised by the Institute of Information Technology Assessment (IITA).