IDEAS home Printed from https://ideas.repec.org/a/pkp/rocere/v9y2022i2p109-121id3082.html
   My bibliography  Save this article

Performance Evaluation of Network Intrusion Detection System for Detecting Zero-Day Attacks: SNORT-XSS Algorithm

Author

Listed:
  • Srinivas Mishra
  • Sateesh Kumar Pradhan
  • Subhendu Kumar Rath

Abstract

The main objective of Intrusion Detection and Prevention Systems is to provide a method of detecting and preventing malicious behaviors in a network system to minimize the harm caused by attackers. In this article, a survey of the techniques applied for the identification and classification of attacks based on KDD Cup’99 and DARPA data set is discussed, and from the open issues a new and a proficient method called SNORT-XSS algorithm is anticipated and implemented that can recognize and classify real time intrusions including zero day attacks. For this research, the SNORT open source tool developed by CISCO Systems was used to describe rules from the existing data collected from DARPA and KDD Cup’99 dataset. Fuzzy Reasoning system is applied to organize the rules into fuzzy sets that reduces true negative and false positive rate. The advantage of Feed Forward Neural Network with Back Propagation of Errors from Artificial Neuron Networks is considered for training, validating and testing the proposed system. The experimental results achieved by preprocessing anomalous behaviors in a network and the detection rate of zero-day attacks or novel attacks were very promising and were beyond expectations. The precision values of the proposed model were 98.93% and 98.89% respectively, and detection rate of Probe and DoS attacks were greater than 98%. The false positive and true negative rate is almost negligible. It was noticed that the best categorization was acquired at epoch numbers from 50 to 55 with a mean squared error of 0.004.

Suggested Citation

  • Srinivas Mishra & Sateesh Kumar Pradhan & Subhendu Kumar Rath, 2022. "Performance Evaluation of Network Intrusion Detection System for Detecting Zero-Day Attacks: SNORT-XSS Algorithm," Review of Computer Engineering Research, Conscientia Beam, vol. 9(2), pages 109-121.
  • Handle: RePEc:pkp:rocere:v:9:y:2022:i:2:p:109-121:id:3082
    as

    Download full text from publisher

    File URL: https://archive.conscientiabeam.com/index.php/76/article/view/3082/6840
    Download Restriction: no

    File URL: https://archive.conscientiabeam.com/index.php/76/article/view/3082/6958
    Download Restriction: no
    ---><---

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:pkp:rocere:v:9:y:2022:i:2:p:109-121:id:3082. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    We have no bibliographic references for this item. You can help adding them by using this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Dim Michael (email available below). General contact details of provider: https://archive.conscientiabeam.com/index.php/76/ .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.