A Fusion of Multiagent Functionalities for Effective Intrusion Detection System

Article English OPEN
Dhanalakshmi Krishnan Sadhasivan ; Kannapiran Balasubramanian (2017)
  • Publisher: Hindawi Limited
  • Journal: Security and Communication Networks (issn: 1939-0114, eissn: 1939-0122)
  • Related identifiers: doi: 10.1155/2017/6216078
  • Subject: Technology (General) | Science (General) | Q1-390 | T1-995 | Article Subject

Provision of high security is one of the active research areas in the network applications. The failure in the centralized system based on the attacks provides less protection. Besides, the lack of update of new attacks arrival leads to the minimum accuracy of detection. The major focus of this paper is to improve the detection performance through the adaptive update of attacking information to the database. We propose an Adaptive Rule-Based Multiagent Intrusion Detection System (ARMA-IDS) to detect the anomalies in the real-time datasets such as KDD and SCADA. Besides, the feedback loop provides the necessary update of attacks in the database that leads to the improvement in the detection accuracy. The combination of the rules and responsibilities for multiagents effectively detects the anomaly behavior, misuse of response, or relay reports of gas/water pipeline data in KDD and SCADA, respectively. The comparative analysis of the proposed ARMA-IDS with the various existing path mining methods, namely, random forest, JRip, a combination of AdaBoost/JRip, and common path mining on the SCADA dataset conveys that the effectiveness of the proposed ARMA-IDS in the real-time fault monitoring. Moreover, the proposed ARMA-IDS offers the higher detection rate in the SCADA and KDD cup 1999 datasets.
  • References (27)
    27 references, page 1 of 3

    Zhang, Y., Wang, L., Sun, W., Green, R. C., Alam, M.. Distributed intrusion detection system in a multi-layer network architecture of smart grids. IEEE Transactions on Smart Grid . 2011; 2 (4): 796-808

    Shamshirband, S., Anuar, N. B., Kiah, M. L. M., Patel, A.. An appraisal and design of a multi-agent system based cooperative wireless intrusion detection computational intelligence technique. Engineering Applications of Artificial Intelligence . 2013; 26 (9): 2105-2127

    Lui, C.-L., Fu, T.-C., Cheung, T.-Y.. Agent-based network intrusion detection system using data mining approaches. : 131-136

    Chauhan, A., Mishra, G., Kumar, G.. Survey on data mining techniques in intrusion detection. International Journal of Scientific & Engineering Research . 2011; 2 (7): 1-4

    Davis, J. J., Clark, A. J.. Data preprocessing for anomaly based network intrusion detection: a review. Computers & Security . 2011; 30 (6-7): 353-375

    Joshi, S. A., Pimprale, V. S.. Network Intrusion Detection System (NIDS) based on data mining. International Journal of Engineering Science and Innovative Technology . 2013; 2 (1): 95-98

    Ferreira, E. W. T., Carrijo, G. A., de Oliveira, R., de Souza Araujo, N. V.. Intrusion detection system with wavelet and neural artifical network approach for networks computers. IEEE Latin America Transactions . 2011; 9 (5): 832-837

    Nadiammai, G. V., Hemalatha, M.. Effective approach toward Intrusion Detection System using data mining techniques. Egyptian Informatics Journal . 2014; 15 (1): 37-50

    Singh, M., Mehta, G., Vaid, C., Oberoi, P.. Detection of malicious node in wireless sensor network based on data mining. : 291-294

    Faisal, M. A., Aung, Z., Williams, J. R., Sanchez, A.. Data-stream-based intrusion detection system for advanced metering infrastructure in smart grid: a feasibility study. IEEE Systems Journal . 2015; 9 (1): 31-44

  • Similar Research Results (1)
  • Metrics
    No metrics available
Share - Bookmark