A Collaborative Anomaly Detection System for Network Intrusion Detection

Authors

  • Ravi Kumar Poluru, Syed Shahul Hameed, B. Sarojini, Balakrishnan S., Senthilnathan Chidambaranathan

Keywords:

Anomaly detection, intrusion, supervised, unsupervised machine learning.

Abstract

Anomaly detection plays a critical role in identifying malicious enterprise network traffic, but it has limitations when applied to modern complex networks. In this system, we recommended a collaborative framework for anomaly detection in network intrusion detection by combining supervised and unsupervised machine learning approaches. A Collaborative Anomaly Detection (CAD) for Network Intrusion Detection is a system specially designed to identify and detect any unusual or abnormal behavior in computer networks that might lead to a possible security breach. The system leverages the power of collaborative machine learning algorithms to identify network anomalies beyond the capabilities of a single machine learning model. The proposed system reduces false positives and improves the accuracy of anomaly detection by integrating multiple data sources. Our experiment results show that the proposed system detects anomalies more effectively than existing methods, demonstrating its effectiveness and scalability. The recommended approach has the potential to be implemented in real-world environments to improve the efficiency and accuracy of network intrusion detection.

Downloads

Download data is not yet available.

References

F. T. Liu, K. M. Ting and Z.-H. Zhou, "Isolation-based anomaly detection", ACM Transactions on Knowledge Discovery from Data (TKDD), vol. 6, no. 1, pp. 3, 2012.

Chandola, V., Banerjee, A., Kumar, V., 2009. Anomaly detection: A survey. ACM Comput. Surv. 41 (3), 1–58. http://dx.doi.org/10.1145/1541880.1541882.

Ranshous, S., Shen, S., Koutra, D., Harenberg, S., Faloutsos, C. and Samatova, N.F. (2015), Anomaly detection in dynamic networks: a survey. WIREs Comput Stat, 7: 223-247. https://doi.org/10.1002/wics.1347

Patcha A, Park J-M. An overview of anomaly detection techniques: existing solutions and latest technological trends. Comput Netw. 2007;51(12):3448–70.

Oswal, S., Shinde, S., Vijayalakshmi, M. (2023). A Survey of Statistical, Machine Learning, and Deep Learning-Based Anomaly Detection Techniques for Time Series. In: Garg, D., Narayana, V.A., Suganthan, P.N., Anguera, J., Koppula, V.K., Gupta, S.K. (eds) Advanced Computing. IACC 2022. Communications in Computer and Information Science, vol 1782. Springer, Cham. https://doi.org/10.1007/978-3-031-35644-5_17

Heard, Nicholas A., David J. Weston, Kiriaki Platanioti, and David J. Hand. “BAYESIAN ANOMALY DETECTION METHODS FOR SOCIAL NETWORKS.” The Annals of Applied Statistics 4, no. 2 (2010): 645–62. http://www.jstor.org/stable/29765524.

Abdulla Amin Aburomman, Mamun Bin Ibne Reaz, A survey of intrusion detection systems based on ensemble and hybrid classifiers, Computers & Security, Volume 65, 2017, Pages 135-152, ISSN 0167-4048, https://doi.org/10.1016/j.cose.2016.11.004.

Max Landauer, Sebastian Onder, Florian Skopik, Markus Wurzenberger, Deep learning for anomaly detection in log data: A survey, Machine Learning with Applications, Volume 12, 2023, 100470, ISSN 2666-8270, https://doi.org/10.1016/j.mlwa.2023.100470.

A. M. S. Ngo Bibinbe, M. F. Mbouopda, G. R. Mbiadou Saleu and E. Mephu Nguifo, "A survey on unsupervised learning algorithms for detecting abnormal points in streaming data," 2022 International Joint Conference on Neural Networks (IJCNN), Padua, Italy, 2022, pp. 1-8, doi: 10.1109/IJCNN55064.2022.9892195.

Ranjeethapriya K, Susila N, Granty Regina Elwin, Balakrishnan S, “Raspberry Pi Based Intrusion Detection System”, International Journal of Pure and Applied Mathematics, Volume 119, No. 12, 2018, pp.1197-1205.

S. Balakrishnan, B. Persis Urbana Ivy and S. Sudhakar Ilango, “A Novel And Secured Intrusion Detection System For Wireless Sensor Networks Using Identity Based Online/Offline Signature”, ARPN Journal of Engineering and Applied Sciences. November 2018, Vol. 13 No. 21, pp. 8544-8547.

J.P.Ananth, S.Balakrishnan, S.P.Premnath, (2018). “Logo Based Pattern Matching Algorithm for Intrusion Detection System in Wireless Sensor Network”, International Journal of Pure and Applied Mathematics, Volume 119, No. 12, 2018, pp. 753-762.

Downloads

Published

26.03.2024

How to Cite

Ravi Kumar Poluru. (2024). A Collaborative Anomaly Detection System for Network Intrusion Detection. International Journal of Intelligent Systems and Applications in Engineering, 12(21s), 4067 –. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/6207

Issue

Section

Research Article