
2  INTRUSION DETECTION 
SYSTEM 
There are two general methods of detecting 
intrusions into computer and network systems: 
anomaly detection and signature recognition 
(Rudzonis , 2003). Anomaly detection techniques 
establish a profile of the subject’s normal behavior 
(norm profile), compare the observed behavior of 
the subject with its norm profile, and signal 
intrusions when the subject’s observed behavior 
differs significantly from its norm profile. Signature 
recognition techniques recognize signatures of 
known attacks, match the observed behavior with 
those known signatures, and signal intrusions when 
there is a match. 
An IDS installed on a network is like a burglar 
alarm system installed in a house. Through various 
methods, both detect when an intruder/burglar is 
present. Both systems issue some type of warning in 
case of detection of presence of intrusion/burglar. 
Systems which use misuse-based techniques 
contain a number of attack descriptions, or 
‘signatures’, that are matched against a stream of 
audit data looking for evidence of the modeled 
attacks. The audit data can be gathered from the 
network, from the operating system, or from 
application log files (Rudzonis, 2003). 
Experimentation conducted in this research work is 
based on DARPA KDD’99 data set. 
3  KDD’99 DARPA DATA SET 
MIT Lincoln Lab’s DARPA intrusion detection 
evaluation data sets have been employed to design 
and test intrusion detection systems. The KDD’99 
intrusion detection datasets are based on the 1998 
DARPA initiative, which provides designers of 
intrusion detection systems (IDS) with a benchmark 
on which to evaluate different methodologies 
(DARPA, 1999,  ISTG, 1998 , Kayacik and   Zincir-
Heywood , 2005). 
To do so, a simulation is made of a factitious 
military network consisting of three ‘target’ 
machines running various operating systems and 
services. Additional three machines are then used to 
spoof different IP addresses to generate traffic. 
Finally, there is a sniffer that records all network 
traffic using the TCP dump format. The total 
simulated period is seven weeks (Kayacik and   
Zincir-Heywood , 2005). Packet information in the 
TCP dump file is summarized into connections. 
Specifically, “a connection is a sequence of TCP 
packets starting and ending at some well defined 
times, between which data flows from a source IP 
address to a target IP address under some well 
defined protocol” (Kayacik and   Zincir-Heywood, 
2005). 
DARPA KDD'99 data set represents data as rows 
of TCP/IP dump where each row consists of 
computer connection which is characterized by 41 
features. 
Features are grouped into four categories: 
  Basic Features:  Basic features can be 
derived from packet headers without 
inspecting the payload. 
  Content Features: Domain knowledge is 
used to assess the payload of the original TCP 
packets. This includes features such as the 
number of failed login attempts; 
  Time-based Traffic Features: These features 
are designed to capture properties that mature 
over a 2 second temporal window. One 
example of such a feature would be the 
number of connections to the same host over 
the 2 second interval; 
  Host-based Traffic Features:  Utilize a 
historical window estimated over the number 
of connections – in this case 100 – instead of 
time. Host based features are therefore 
designed to assess attacks, which span 
intervals longer than 2 seconds. 
In this comparative study, we used KDD' 99 base 
which is counting almost 494019 of training 
connections. Based upon a discriminate analysis, we 
used data about only important features (the 9
th
 first 
features): 
  Protocol type: type of the protocol, e.g. tcp, 
udp, etc.  
  Service:  network service on the destination, 
e.g., http, telnet, etc.  
  Land: 1 if connection is from/to the same 
host/port; 0 otherwise.  
  Wrong fragment: number of ``wrong'' 
fragments. 
  Num_failed_logins:  number of failed login 
attempts. 
  Logged_in:  1 if successfully logged in; 0 
otherwise. 
  Root_shell:  1 if root shell is obtained; 0 
otherwise. 
  Is_guest_login:  1 if the login is a ``guest'' 
login; 0 otherwise. 
  To these features, we added the 
"attack_type". Indeed each training connection 
COMPARATIVE STUDY BETWEEN BAYESIAN NETWORK AND POSSIBILISTIC NETWORK IN INTRUSION
DETECTION
25