Intrusion Detection for Database Security using a Hidden Naïve Bayes Binary Classifier
PDF
PDF

How to Cite

Deepa, M., and J. Dhilipan. 2022. “Intrusion Detection for Database Security Using a Hidden Naïve Bayes Binary Classifier”. Journal of Soft Computing Paradigm 4 (2): 48-57. https://doi.org/10.36548/jscp.2022.2.001.

Keywords

— Data mining
— intrusion detection
— machine learning
— classifier
Published: 30-05-2022

Abstract

The Hidden Naive Bayes Binary Classifier is used for Database Security to detect Intruders. Data mining is used a lot in intrusion detection systems to classify normal or anomaly events. This method is a transparent, effective, and widely used mining method based on the idea of conditional attribute independence. HNB classifier is a more advanced version of Naive Bayes classifier algorithm and is efficiently used for intrusion attacks. It keeps the simplicity and efficiency of Naive Bayes, but loosens the independence condition. In the tests, it is proved that this binary classifier model can be used to solve the intrusion detection problem.

References

  1. P. Kabiri and A. A. Ghorbani, "Research on intrusion detection and response: A survey," International Journal of Network Security, vol. 1, pp. 84-102, 2005.
  2. T. F. Lunt, "Real-time intrusion detection," in COMPCON Spring '89. Thirty-Fourth IEEE Computer Society International Conference: Intellectual Leverage, Digest of Papers., 1989, pp. 348-353.
  3. Dr.Roopa M ,Dr.Selvakumarraja “Secured Intrusion Detection System using Tristate Algorithm”, International Journal of Applied Engineering Research, ISSN 0973-4562 Vol. 10 No.20 (2015), 0973-4562.
  4. Dr.Roopa M ,Dr.Selvakumarraja “An intelligent network algorithm for enhanced security in a mobile ad hoc network”, International Journal of Networking and Virtual Organisations, Vol. 17, Nos. 2/3, 2017,1470-9503.
  5. Dr.Roopa M ,Dr.Selvakumarraja “Implementation of MIML Technique in Intrusion and Detection for Network layer attacks in MANET”, International journal of Research in Dynamic research and control systems, Vol.10,No.6, 895-901,2018.
  6. J. Cannady, "The application of artificial neural networks to misuse detection: initial results," in Proceedings of the Recent Advances in Intrusion Detection ’98 Conference, Louvain-la-Neuve, Belgium, 1998, pp. 31-47.
  7. R. P. Lippmann, Cunningham, R. K., "Improving intrusion detection performance using keyword selection and neural networks," Computer Networks, vol. 34, pp. 597-603, 2000.
  8. M. Panda and M. R. Patra, "Network intrusion detection using naive Bayes," International Journal of Computer Science and Network Security, vol. 7, pp. 258-263, 2007.
  9. B. Gao, HY. Ma, and YH. Yang "HMMs (Hidden Markov Models) based on anomaly intrusion detection method," in International Conference on Machine Learning and Cybernetics, 2002, 2002, pp. 381-385.
  10. L. Jiang, Z. Harry, and C. Zhihua, "A Novel Bayes Model: Hidden Naive Bayes," Knowledge and Data Engineering, IEEE Transactionson, vol. 21, pp. 1361-1371, 2009.
  11. J. Yaguang, Songnian, Y., Yafeng, Z., "A novel Naive Bayes model: Packaged Hidden Naive Bayes," in Information Technology and Artificial Intelligence Conference (ITAIC), 2011 6th IEEE Joint International, 2011, pp. 484-487.
  12. L. Koc, T. A. Mazzuchi, and S. Sarkani, "A network intrusion detection system based on a Hidden Naïve Bayes multiclass classifier," Expert Systems with Applications, vol. 39, pp. 13492- 13500, 2012.
  13. KDD-Cup. (1999, July 29, 2011). KDD Cup 1999 Data. Available: http://kdd.ics.uci.edu/databases/kddcup99/kddc up99.html
  14. P. Langley, W. Iba, and K. Thompson, "An analysis of Bayesian classifiers," in Proceedings of the tenth national conference on artificial intelligence, San Jose, California, 1992, pp. 223- 228.