JISE


  [1] [2] [3] [4] [5] [6] [7] [8] [9] [10] [11] [12] [13] [14] [15] [16] [17] [18] [19]


Journal of Information Science and Engineering, Vol. 22 No. 6, pp. 1447-1464


Effective Intrusion Detection Model through the Combination of a Signature-based Intrusion Detection System and a Machine Learning-based Intrusion Detection System


Ill-Young Weon, Doo Heon Song+ and Chang-Hoon Lee
Department of Computer Science and Engineering 
Konkuk University 
Seoul 143-701, Korea 
E-mail: {clcc; chlee}@konkuk.ac.kr 
+Department of Computer Game and Information 
Yong-In SongDam Colleage 
5771 Mapyong Dong Young-In Kyungki, Korea 
E-mail: dsong@ysc.ac.kr


    In the field of network intrusion detection, both the signature-based intrusion detection system and the machine learning-based intrusion detection system possess advantages and disadvantages. When the two discrepant systems are combined in a way that the former is used as the main system and the latter as a supporting system, the machine learning-based intrusion detection system measures the validity of alarms determined by the signature-based intrusion detection system and filters out any false alarms. What is more, such an approach can also detect attacks that the signature-based system by itself cannot detect. The objective of this paper is to propose a combined model of the signature-based and machine learning-based intrusion detection systems and to show that the combined system is more efficient than each individual system. We used the DARPA Data Set in experiments in order to show the usefulness of the combined model. Snort was used for the experiment as a signature-based intrusion detection system and extended IBL (Instance- based Learner) was used as the principal learning algorithm for the machine learning-based intrusion detection system. To compare performances of the algorithms, C4.5 was used.


Keywords: network intrusion detection system, machine learning, combined model, false alarm, detection of new attack, instance-based learner

  Retrieve PDF document (JISE_200606_09.pdf)