A Clustering based Algorithm for Network Intrusion Detection

被引:0
|
作者
Arya, K. V. [1 ]
Kumar, Hemant [1 ]
机构
[1] ABV Indian Inst Informat Technol & Management, Gwalior, India
关键词
Cluster; Seeded k-means; Snort; Hybrid;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The secure information transmission is very important in the present scenario. Many intrusion detection system (IDS) have been developed in recent past which are based on either signature information or anomaly information. But all these systems do generate a lot of false detections. In this work a hybrid IDS is being proposed which uses the signature and anomaly information together. The proposed algorithm first explore those traffic features which are changing during an intrusion activity and then based on a predefined threshold value the most prominent features related to attack are identified. Thereafter, these features are included in snort rule set to detect the anomalous traffic. This anomaly detection process is combined with existing signature of snort to produce the better detection. The proposed detection algorithm has been implemented on KDDcup99 dataset. It is observed through experimental results that the proposed algorithm efficiently detect the intrusion activity in the given network.
引用
收藏
页码:193 / 196
页数:4
相关论文
共 50 条
  • [21] An Improved Kernel Clustering Algorithm Used in Computer Network Intrusion Detection
    He, Di
    Chen, Xin
    Zou, Danping
    Pei, Ling
    Jiang, Lingge
    2018 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), 2018,
  • [22] An Adaptive Clustering Algorithm for Intrusion Detection
    QIU JuliNormal University of AnshanAnshanChina
    现代电子技术, 2007, (02) : 130 - 132
  • [23] An adaptive clustering algorithm for intrusion detection
    Wu, Guowei
    Yao, Lin
    Yao, Kai
    2006 IEEE INTERNATIONAL CONFERENCE ON INFORMATION ACQUISITION, VOLS 1 AND 2, CONFERENCE PROCEEDINGS, 2006, : 1443 - 1447
  • [24] Research on Network Intrusion Detection System Based on Improved K-means Clustering Algorithm
    Li Tian
    Wang Jianwen
    2009 INTERNATIONAL FORUM ON COMPUTER SCIENCE-TECHNOLOGY AND APPLICATIONS, VOL 1, PROCEEDINGS, 2009, : 76 - 79
  • [25] A Clustering Algorithm Oriented to Intrusion Detection
    Li Wei
    Yang Zhong-ming
    Chang Ya-ping
    Zhang Bin
    2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (CSE) AND IEEE/IFIP INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING (EUC), VOL 1, 2017, : 862 - 865
  • [26] An unsupervised clustering algorithm for intrusion detection
    Guan, Y
    Ghorbani, AA
    Belacel, N
    ADVANCES IN ARTIFICIAL INTELLIGENCE, PROCEEDINGS, 2003, 2671 : 616 - 617
  • [27] A Graph-based Clustering Algorithm for Anomaly Intrusion Detection
    Zhou Mingqiang
    Huang Hui
    Wang Qian
    PROCEEDINGS OF 2012 7TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE & EDUCATION, VOLS I-VI, 2012, : 1311 - 1314
  • [28] Intrusion Detection based on ant colony algorithm of Fuzzy clustering
    Li, Wei Song
    Duan, Long Zhen
    Bai, Xiao Ming
    Zhang, Xu
    2011 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT), VOLS 1-4, 2012, : 1642 - 1645
  • [29] Network intrusion detection algorithm based on deep neural network
    Jia, Yang
    Wang, Meng
    Wang, Yagang
    IET INFORMATION SECURITY, 2019, 13 (01) : 48 - 53
  • [30] Adaptive clustering for network intrusion detection
    Oldmeadow, J
    Ravinutala, S
    Leckie, C
    ADVANCES IN KNOWLEDGE DISCOVERY AND DATA MINING, PROCEEDINGS, 2004, 3056 : 255 - 259