PCA filtering and probabilistic SOM for network intrusion detection

被引:118
|
作者
De la Hoz, Eduardo [1 ]
De La Hoz, Emiro [1 ]
Ortiz, Andres [2 ]
Ortega, Julio [3 ]
Prieto, Beatriz [3 ]
机构
[1] Univ Costa, Programa Ingn Sistemas, Barranquilla, Colombia
[2] Univ Malaga, Dept Commun Engn, E-29071 Malaga, Spain
[3] Univ Granada, CITIC, Comp Architecture & Technol Dept, E-18071 Granada, Spain
关键词
Probabilistic SOM; Bayesian SOM; IDS; Self-organizing maps; PCA filtering; FEATURE-SELECTION;
D O I
10.1016/j.neucom.2014.09.083
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The growth of the Internet and, consequently, the number of interconnected computers, has exposed significant amounts of information to intruders and attackers. Firewalls aim to detect violations according to a predefined rule-set and usually block potentially dangerous incoming traffic. However, with the evolution of attack techniques, it is more difficult to distinguish anomalies from normal traffic. Different detection approaches have been proposed, including the use of machine learning techniques based on neural models such as Self-Organizing Maps (SOMs). In this paper, we present a classification approach that hybridizes statistical techniques and SOM for network anomaly detection. Thus, while Principal Component Analysis (PCA) and Fisher Discriminant Ratio (FDR) have been considered for feature selection and noise removal, Probabilistic Self-Organizing Maps (PSOM) aim to model the feature space and enable distinguishing between normal and anomalous connections. The detection capabilities of the proposed system can be modified without retraining the map, but only by modifying the units activation probabilities. This deals with fast implementations of Intrusion Detection Systems (IDS) necessary to cope with current link bandwidths. (C) 2015 Elsevier B.V. All rights reserved.
引用
收藏
页码:71 / 81
页数:11
相关论文
共 50 条
  • [1] Research on Intrusion Detection Based on an Improved SOM Neural Network
    Jiang, Dianbo
    Yang, Yahui
    Xia, Min
    FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 400 - 403
  • [2] Network Intrusion Detection Method Based on PCA and Bayes Algorithm
    Zhang, Bing
    Liu, Zhiyang
    Jia, Yanguo
    Ren, Jiadong
    Zhao, Xiaolin
    SECURITY AND COMMUNICATION NETWORKS, 2018,
  • [3] Advanced probabilistic approach for network intrusion forecasting and detection
    Shin, Seongjun
    Lee, Seungmin
    Kim, Hyunwoo
    Kim, Sehun
    EXPERT SYSTEMS WITH APPLICATIONS, 2013, 40 (01) : 315 - 322
  • [4] Enhancing network intrusion detection with integrated sampling and filtering
    Gonzalez, Jose M.
    Paxson, Vern
    RECENT ADVANCES IN INTRUSION DETECTION, PROCEEDINGS, 2006, 4219 : 272 - 289
  • [5] Anormaly Intrusion Detection Based on SOM
    Li Min
    Wang Dongliang
    2009 WASE INTERNATIONAL CONFERENCE ON INFORMATION ENGINEERING, ICIE 2009, VOL I, 2009, : 40 - 43
  • [6] Boosted Modified Probabilistic Neural Network (BMPNN) for network intrusion detection
    Tran, Tich Phuoc
    Jan, Tony
    2006 IEEE INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORK PROCEEDINGS, VOLS 1-10, 2006, : 2354 - +
  • [7] Detection of Network Intrusion Threat Based on the Probabilistic Neural Network Model
    Wang, Benyou
    Gu, Li
    INFORMATION TECHNOLOGY AND CONTROL, 2019, 48 (04): : 618 - 625
  • [8] Intrusion Detection using Deep Belief Network and Probabilistic Neural Network
    Zhao, Guangzhen
    Zhang, Cuixiao
    Zheng, Lijuan
    2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (CSE) AND IEEE/IFIP INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING (EUC), VOL 1, 2017, : 639 - 642
  • [9] A new approach of network intrusion detection using HVDM-based SOM
    Wang, L
    Yang, Y
    Sun, SX
    ADVANCES IN NEURAL NETWORKS - ISNN 2005, PT 3, PROCEEDINGS, 2005, 3498 : 488 - 493
  • [10] A network intrusion detection based on improved Nonlinear Fuzzy Robust PCA
    Hadri, Amal
    Chougdali, Khalid
    Touahni, Raja
    2018 IEEE 5TH INTERNATIONAL CONGRESS ON INFORMATION SCIENCE AND TECHNOLOGY (IEEE CIST'18), 2018, : 636 - 641