A Clustering based Algorithm for Network Intrusion Detection

被引:0
|
作者
Arya, K. V. [1 ]
Kumar, Hemant [1 ]
机构
[1] ABV Indian Inst Informat Technol & Management, Gwalior, India
关键词
Cluster; Seeded k-means; Snort; Hybrid;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The secure information transmission is very important in the present scenario. Many intrusion detection system (IDS) have been developed in recent past which are based on either signature information or anomaly information. But all these systems do generate a lot of false detections. In this work a hybrid IDS is being proposed which uses the signature and anomaly information together. The proposed algorithm first explore those traffic features which are changing during an intrusion activity and then based on a predefined threshold value the most prominent features related to attack are identified. Thereafter, these features are included in snort rule set to detect the anomalous traffic. This anomaly detection process is combined with existing signature of snort to produce the better detection. The proposed detection algorithm has been implemented on KDDcup99 dataset. It is observed through experimental results that the proposed algorithm efficiently detect the intrusion activity in the given network.
引用
收藏
页码:193 / 196
页数:4
相关论文
共 50 条
  • [11] Application of Network Intrusion Detection Based on Fuzzy C-Means Clustering Algorithm
    Ren, Wuling
    Cao, Jinzhu
    Wu, Xianjie
    2009 THIRD INTERNATIONAL SYMPOSIUM ON INTELLIGENT INFORMATION TECHNOLOGY APPLICATION, VOL 3, PROCEEDINGS, 2009, : 19 - +
  • [12] An Industrial Network Intrusion Detection Algorithm Based on Multifeature Data Clustering Optimization Model
    Liang, Wei
    Li, Kuan-Ching
    Long, Jing
    Kui, Xiaoyan
    Zomaya, Albert Y.
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2020, 16 (03) : 2063 - 2071
  • [13] Network intrusion detection technology based on improved C-means clustering algorithm
    Wang, Yanjun
    Journal of Networks, 2013, 8 (11) : 2541 - 2547
  • [14] A Network Intrusion Detection Algorithm Based on Rough Set Attribute-weighted Clustering
    Wang Lifang
    ISTM/2009: 8TH INTERNATIONAL SYMPOSIUM ON TEST AND MEASUREMENT, VOLS 1-6, 2009, : 3551 - 3554
  • [15] The Research of Intrusion Detection Based on Mixed Clustering Algorithm
    Liu, Nanyan
    COMPUTATIONAL INTELLIGENCE AND INTELLIGENT SYSTEMS, 2012, 316 : 92 - 100
  • [16] Advanced Clustering Based Intrusion Detection (ACID) Algorithm
    Borah, Samarjeet
    Chakravorty, Debaditya
    Chawhan, Chandan
    Saha, Aritra
    ADVANCES IN COMPUTING AND COMMUNICATIONS, PT III, 2011, 192 : 35 - 43
  • [17] Application of Clustering Algorithm in Intrusion Detection Based on PCA
    Li, Han
    2015 International Conference on Software Engineering and Information System (SEIS 2015), 2015, : 239 - 244
  • [18] Clustering-Based Network Intrusion Detection System
    Fan, Chun-I
    Lai, Yen-Lin
    Shie, Cheng-Han
    2022 5TH IEEE CONFERENCE ON DEPENDABLE AND SECURE COMPUTING (IEEE DSC 2022), 2022,
  • [19] Network intrusion detection based on artificial immune clustering
    Zhong, J. (zhongjiang@cqu.edu.cn), 1600, Binary Information Press, Flat F 8th Floor, Block 3, Tanner Garden, 18 Tanner Road, Hong Kong (10):
  • [20] Network intrusion detection based on GMKL Algorithm
    Li, Yuxiang
    Wang, Haiming
    Yu, Hongkui
    Ren, Changquan
    Geng, Qingjia
    Journal of Networks, 2013, 8 (06) : 1315 - 1321