Attribute Reduction and Design of Intrusion Detection System Based on K-Nearest Neighbours

被引:0
|
作者
Solanki, Amit D. [1 ]
Gohil, Bhavesh N. [1 ]
机构
[1] Sardar Vallabhbhai Natl Inst Technol, Dept Comp Engn, Surat 395007, Gujarat, India
关键词
Intrusion detection system (IDS); k-nearest neighbours (KNN); support vector machines (SVM); clustering K-NN (k-nearest neighbor) support vector machines (CKSVMs); detection rate (DR); false alarm rate (FAR); NETWORKS;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Intrusion detection is a necessary step to identify unusual access or attacks to secure internal networks. Nowadays, challenged by malicious use of network and intentional attacks on personal computer system, intrusion detection system (IDS) has become a useful infrastructural mechanism for securing critical resource and information. Most current intrusion detection systems focus on hybrid machine learning technologies. The related work has demonstrated that they can get superior performance than applying single machine learning algorithm in detection model. Besides, in the related works, feature selecting and representing techniques are also essential for achieve high efficiency and effectiveness. Performance of specified attack type detection should also be improved and evaluated. In this technique inclusion of classification for selecting most relevant attributes and use of k-Nearest Neighbours (K-NN) to detect attacks. Our system can achieve good accuracy, detection rate and false alarm rate using K-NN.
引用
收藏
页码:127 / 132
页数:6
相关论文
共 50 条
  • [1] Attribute reduction based on k-nearest neighborhood rough sets
    Wang, Changzhong
    Shi, Yunpeng
    Fan, Xiaodong
    Shao, Mingwen
    INTERNATIONAL JOURNAL OF APPROXIMATE REASONING, 2019, 106 : 18 - 31
  • [2] Intrusion Detection Using k-Nearest Neighbor
    Govindarajan, M.
    Chandrasekaran, R. M.
    FIRST INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING 2009 (ICAC 2009), 2009, : 13 - +
  • [3] Extended k-nearest neighbours based on evidence theory
    Wang, H
    Bell, D
    COMPUTER JOURNAL, 2004, 47 (06): : 662 - 672
  • [4] A K-nearest neighbours method based on imprecise probabilities
    Destercke, Sebastien
    SOFT COMPUTING, 2012, 16 (05) : 833 - 844
  • [5] A K-nearest neighbours method based on imprecise probabilities
    Sebastien Destercke
    Soft Computing, 2012, 16 : 833 - 844
  • [6] An Occupancy Mapping Method Based on K-Nearest Neighbours
    Miao, Yu
    Hunter, Alan
    Georgilas, Ioannis
    SENSORS, 2022, 22 (01)
  • [7] Ransomware Detection Based on Opcode Behaviour Using K-Nearest Neighbours Algorithm
    Stiawan, Deris
    Daely, Somame Morianus
    Heryanto, Ahmad
    Afifah, Nurul
    Idris, Mohd Yazid
    Budiarto, Rahmat
    INFORMATION TECHNOLOGY AND CONTROL, 2021, 50 (03): : 495 - 506
  • [8] K-Nearest Neighbor and Boundary Cutting Algorithm for Intrusion Detection System
    Mulak, Punam
    Gaikwad, D. P.
    Talhar, N. R.
    INFORMATION SYSTEMS DESIGN AND INTELLIGENT APPLICATIONS, VOL 2, INDIA 2016, 2016, 434 : 269 - 278
  • [9] k-Nearest Neighbours Classification Based Sybil Attack Detection in Vehicular Networks
    Gu, Pengwenlong
    Khatoun, Rida
    Begriche, Youcef
    Serhrouchni, Ahmed
    PROCEEDINGS OF THE 2017 THIRD INTERNATIONAL CONFERENCE ON MOBILE AND SECURE SERVICES (MOBISECSERV), 2017,
  • [10] An evolutionary voting for k-nearest neighbours
    Mateos-Garcia, Daniel
    Garcia-Gutierrez, Jorge
    Riquelme-Santos, Jose C.
    EXPERT SYSTEMS WITH APPLICATIONS, 2016, 43 : 9 - 14