Mining network data for intrusion detection through Naïve Bayesian with clustering

被引:0
|
作者
Farid, Dewan Md [1 ]
Harbi, Nouria [2 ]
Ahmmed, Suman [3 ]
Rahman, Md. Zahidur [4 ]
Rahman, Chowdhury Mofizur [5 ]
机构
[1] ERIC Laboratory, University Lumière Lyon 2, 5 av. Pierre Mendes, France - 69676 BRON Cedex, France
[2] ERIC Laboratory, University Lumière Lyon 2, France
[3] University Lumière Lyon 2, France
[4] Department of Computer Science and Engineering, Jahangirnagar University, Bangladesh
[5] Department of Computer Science and Engineering, United International University, Bangladesh
关键词
Benchmarking - Clustering algorithms - Probability - Network security - Classification (of information) - Data mining;
D O I
暂无
中图分类号
学科分类号
摘要
Network security attacks are the violation of information security policy that received much attention to the computational intelligence society in the last decades. Data mining has become a very useful technique for detecting network intrusions by extracting useful knowledge from large number of network data or logs. Naïve Bayesian classifier is one of the most popular data mining algorithm for classification, which provides an optimal way to predict the class of an unknown example. It has been tested that one set of probability derived from data is not good enough to have good classification rate. In this paper, we proposed a new learning algorithm for mining network logs to detect network intrusions through naïve Bayesian classifier, which first clusters the network logs into several groups based on similarity of logs, and then calculates the prior and conditional probabilities for each group of logs. For classifying a new log, the algorithm checks in which cluster the log belongs and then use that cluster's probability set to classify the new log. We tested the performance of our proposed algorithm by employing KDD99 benchmark network intrusion detection dataset, and the experimental results proved that it improves detection rates as well as reduces false positives for different types of network intrusions.
引用
收藏
页码:341 / 345
相关论文
共 50 条
  • [41] Data mining approaches for intrusion detection
    Lee, W
    Stolfo, SJ
    PROCEEDINGS OF THE SEVENTH USENIX SECURITY SYMPOSIUM, 1998, : 79 - 93
  • [42] Intrusion Detection Based on Data Mining
    Oreku, George S.
    Mtenzi, Fredrick J.
    EIGHTH IEEE INTERNATIONAL CONFERENCE ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, PROCEEDINGS, 2009, : 696 - 701
  • [43] Adaptive intrusion detection with data mining
    Hossain, M
    Bridges, SM
    Vaughn, RB
    2003 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN AND CYBERNETICS, VOLS 1-5, CONFERENCE PROCEEDINGS, 2003, : 3097 - 3103
  • [44] A Study of Intrusion Detection in Data Mining
    Reddy, E. Kesavalu
    Reddy, V. Naveen
    Rajulu, P. Govinda
    WORLD CONGRESS ON ENGINEERING, WCE 2011, VOL III, 2011, : 1889 - 1894
  • [45] Intrusion detection based on data mining
    Yin, Jian
    Mei, Fang
    Zhang, Gang
    COMPUTATIONAL INTELLIGENCE, PT 2, PROCEEDINGS, 2006, 4114 : 724 - 729
  • [46] Intelligent Bayesian classifiers in network intrusion detection
    Bosin, A
    Dessì, N
    Pes, B
    INNOVATIONS IN APPLIED ARTIFICIAL INTELLIGENCE, 2005, 3533 : 445 - 447
  • [47] Bayesian Model Averaging of Bayesian Network Classifiers for Intrusion Detection
    Xiao, Liyuan
    Chen, Yetian
    Chang, Carl K.
    2014 38TH ANNUAL IEEE INTERNATIONAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE WORKSHOPS (COMPSACW 2014), 2014, : 128 - 133
  • [48] A clustering approach to wireless network intrusion detection
    Zhong, S
    Khoshgoftaar, TM
    Nath, SV
    ICTAI 2005: 17TH IEEE INTERNATIONAL CONFERENCE ON TOOLS WITH ARTIFICIAL INTELLIGENCE, PROCEEDINGS, 2005, : 190 - 196
  • [49] CLUSTERING-BASED NETWORK INTRUSION DETECTION
    Zhong, Shi
    Khoshgoftaar, Taghi M.
    Seliya, Naeem
    INTERNATIONAL JOURNAL OF RELIABILITY QUALITY AND SAFETY ENGINEERING, 2007, 14 (02) : 169 - 187
  • [50] Research On Clustering Technique In Network Intrusion Detection
    Cui, Kuiyong
    2012 INTERNATIONAL CONFERENCE ON INDUSTRIAL CONTROL AND ELECTRONICS ENGINEERING (ICICEE), 2012, : 1203 - 1205