I. J. Computer Network and Information Security, 2016, 1, 35-42 Published Online January 2016 in MECS (http://www.mecs-press.org/) DOI: 10.5815/ijcnis.2016.01.05 Copyright © 2016 MECS I.J. Computer Network and Information Security, 2016, 1, 35-42 Intrusion Detection with Multi-Connected Representation Abdelkader Khobzaoui Dr Moulay Tahar University, Saida, Algeria Email: akhobzaoui@yahoo.fr Abderrahmane Yousfate Djilali Liabes University, Sidi Bel Abbes, Algeria Email: yousfate@univ-sba.dz AbstractRecently, considerable attention has been given to data mining techniques to improve the performance of intrusion detection systems (IDS). This has led to the application of various classification and clustering techniques for the purpose of intrusion detection. Most of them assume that behaviors, both normal and intrusions, are represented implicitly by connected classes. We state that such assumption isn't evident and is a source of the low detection rate and false alarm. This paper proposes a suitable method able to reach high detection rate and overcomes the disadvantages of conventional approaches which consider that behaviors must be closed to connected representation only. The main strategy of the proposed method is to segment sufficiently each behavior representation by connected subsets called natural classes which are used, with a suitable metric, as tools to build the expected classifier. The results show that the proposed model has many qualities compared to conventional models; especially regarding those have used DARPA data set for testing the effectiveness of their methods. The proposed model provides decreased rates both for false negative rates and for false positives. Index TermsConnected representation, Discriminant Analysis, Mahalanobis distance, mixture of probability laws, multi-connected representation, natural class, synthetic class. I. INTRODUCTION Recently, methods of data mining and machine learning become the principal basis of intrusion detection system (IDS) study. The both methods are often statistics- based or computational intelligence-based. In the literature, anomaly or misuse detections techniques used to build an intrusion detection system consider generally that each intrusion or normal behavior representation in the assumed topological space is implicitly a connected set. Actually, this assumption isn’t evident. A simple illustration of the representation of some behavior classes by Principal Component Analysis applied to the KDD’99 data set [10] shows that there exists some representations which can be non-connected (for example, see Fig. 1); even the normal class is concerned. According to separating hyper plane theorem (Hahn-Banach theorem and its corollaries), this non- connectivity persists in high dimension spaces even if the dimension is infinite. Therefore, if geometric representation of some behavior (normal or abnormal) is non-connected by setting a number of features, the addition of further features preserves the non connectedness of this representation. This remark yields that both misuse and anomaly used models will be affected considerably by this work in case where these models assume that classes are connected unfairly. a) Normal b) Neptune c) Satan Fig.1. 2D representation of some behaviors