Reinforced Intrusion Detection Using Pursuit Reinforcement Competitive Learning
Today, information technology is growing rapidly,all information can be obtainedmuch easier. It raises some new problems; one of them is unauthorized access to the system. We need a reliable network security system that is resistant to a variety of attacks against the system. Therefore, Intrusion Detection System (IDS) required to overcome the problems of intrusions. Many researches have been done on intrusion detection using classification methods. Classification methodshave high precision, but it takes efforts to determine an appropriate classification model to the classification problem. In this paper, we propose a new reinforced approach to detect intrusion with On-line Clustering using Reinforcement Learning. Reinforcement Learning is a new paradigm in machine learning which involves interaction with the environment.It works with reward and punishment mechanism to achieve solution. We apply the Reinforcement Learning to the intrusion detection problem with considering competitive learning using Pursuit Reinforcement Competitive Learning (PRCL). Based on the experimental result, PRCL can detect intrusions in real time with high accuracy (99.816% for DoS, 95.015% for Probe, 94.731% for R2L and 99.373% for U2R) and high speed (44 ms).The proposed approach can help network administrators to detect intrusion, so the computer network security systembecome reliable.
Keywords: Intrusion Detection System, On-Line Clustering,Â Reinforcement Learning, Unsupervised Learning.
Kyaw Thet Khaing, Enhanced Features Ranking and Selection using Recursive Feature Elimination(RFE) and k-Nearest Neighbor Algorithms in Support Vector Machine for Intrusion Detection System, International Journal of Network and Mobile Technologies, Vol. 1, Issue 1, pp. 1832-6758, June 2010.
Amir Azimi Alasti, Kaveh Feyzi, Zahra Atashbar Orang, Hadi Bahrbegi, Elnaz Safarzadeh, Using Learning Vector Quantization in Alert Management of Intrusion Detection System, International Journal of Computer Science and Security (IJCSS), Vol. 6, Issue. 2, 2012.
Reyadh Shaker Naoum, Zainab Namh Al-Sultani, Learning Vector Quantization (LVQ) and k-Nearest Neighbor for Intrusion Classification, World of Computer Science and Information Technology Journal (WCSIT), Vol. 2, No. 3, pp. 105-109, 2012.
Manoj Sharma, Keshav Jindal,Ashish Kumar,Intrusion Detection System using Bayesian Approach for Wireless Network, International Journal of Computer Applications, Volume 48â€“ No.5, pp. 0975- 888, June 2012.
A. S. Aneetha and Dr. S. Bose, The Combined Approach for Anomaly Detection using Neural Networks and Clustering Techniques, Computer Science & Engineering An International (CSEIJ), Vol.2, No.4, pp.37-46, August, 2012.
Prof. Dr. Kais Said Al-Sabbagh, Assist. Prof. Hamid M. Ali, Elaf Sabah Abbas, Development an Anomaly Network Intrusion Detection System Using Neural Network, Journal of Engineering, Vol. 18, No. 12, pp. 1325-1334, December, 2012.
A. M. Chandrashekhar, K. Raghuveer, Fortification of Hybrid Intrusion Detection System Using Variants of Neural Networks and Support Vector Machines, International Journal of Network Security &Its Applications (IJNSA), Vol.5, No.1, pp. 71-90, January, 2013.
Reyadh Shaker Naoum, Zainab Namh Al-Sultani, Hibrid System of Learning Vector Quantization and Enhanced Resilient Backpropagation Artificial Neural Network for Intrusion Classification, International Journal of Research and Reviews in Applied Sciences (IJRRAS), Vol. 14, No. 2, February 2013.
Nitin Mohan Sharma, Tapan P. Gondaliya, Enhance IDS False Alarm Filtering Using KNN Classifier, International Journal of Emerging Research in Management & Technology, Vol. 2, Issue 5, pp. 2278-9359, May 2013.
Ali Ridho Barakbah, Kohei Arai, Pursuit Reinforcement Competitive Learning,Information and Communication Technology Seminar (ICTS), 2006.
http://www.cert.org/stats/ [accessed on July 28 th , 2013] .
www.cert.org/archive/pdf/CERTCC_Vulnerability_Discovery.pdf [accessed on July28 th , 2013].
The copyright to this article is transferred to Politeknik Elektronika Negeri Surabaya(PENS) if and when the article is accepted for publication. The undersigned hereby transfers any and all rights in and to the paper including without limitation all copyrights to PENS. The undersigned hereby represents and warrants that the paper is original and that he/she is the author of the paper, except for material that is clearly identified as to its original source, with permission notices from the copyright owners where required. The undersigned represents that he/she has the power and authority to make and execute this assignment. The copyright transfer form can be downloaded here .
The corresponding author signs for and accepts responsibility for releasing this material on behalf of any and all co-authors. This agreement is to be signed by at least one of the authors who have obtained the assent of the co-author(s) where applicable. After submission of this agreement signed by the corresponding author, changes of authorship or in the order of the authors listed will not be accepted.
Retained Rights/Terms and Conditions
- Authors retain all proprietary rights in any process, procedure, or article of manufacture described in the Work.
- Authors may reproduce or authorize others to reproduce the work or derivative works for the author’s personal use or company use, provided that the source and the copyright notice of Politeknik Elektronika Negeri Surabaya (PENS) publisher are indicated.
- Authors are allowed to use and reuse their articles under the same CC-BY-NC-SA license as third parties.
- Third-parties are allowed to share and adapt the publication work for all non-commercial purposes and if they remix, transform, or build upon the material, they must distribute under the same license as the original.
To avoid plagiarism activities, the manuscript will be checked twice by the Editorial Board of the EMITTER International Journal of Engineering Technology (EMITTER Journal) using iThenticate Plagiarism Checker and the CrossCheck plagiarism screening service. The similarity score of a manuscript has should be less than 25%. The manuscript that plagiarizes another author’s work or author's own will be rejected by EMITTER Journal.
Authors are expected to comply with EMITTER Journal's plagiarism rules by downloading and signing the plagiarism declaration form here and resubmitting the form, along with the copyright transfer form via online submission.