A Clustering based Algorithm for Network Intrusion Detection

被引:0
|
作者
Arya, K. V. [1 ]
Kumar, Hemant [1 ]
机构
[1] ABV Indian Inst Informat Technol & Management, Gwalior, India
关键词
Cluster; Seeded k-means; Snort; Hybrid;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The secure information transmission is very important in the present scenario. Many intrusion detection system (IDS) have been developed in recent past which are based on either signature information or anomaly information. But all these systems do generate a lot of false detections. In this work a hybrid IDS is being proposed which uses the signature and anomaly information together. The proposed algorithm first explore those traffic features which are changing during an intrusion activity and then based on a predefined threshold value the most prominent features related to attack are identified. Thereafter, these features are included in snort rule set to detect the anomalous traffic. This anomaly detection process is combined with existing signature of snort to produce the better detection. The proposed detection algorithm has been implemented on KDDcup99 dataset. It is observed through experimental results that the proposed algorithm efficiently detect the intrusion activity in the given network.
引用
收藏
页码:193 / 196
页数:4
相关论文
共 50 条
  • [31] Network traffic clustering for intrusion detection
    Arina, Nikishova
    Irina, Ananina
    Evgeny, Ananin
    PROCEEDINGS OF THE IV INTERNATIONAL RESEARCH CONFERENCE INFORMATION TECHNOLOGIES IN SCIENCE, MANAGEMENT, SOCIAL SPHERE AND MEDICINE (ITSMSSM 2017), 2017, 72 : 252 - 256
  • [32] Intrusion Detection based on ART and Artificial Immune Network Clustering
    Liu, F
    Bai, L
    Jiao, LC
    ADVANCES IN NATURAL COMPUTATION, PT 2, PROCEEDINGS, 2005, 3611 : 780 - 783
  • [33] Intrusion detection in network flows based on an optimized clustering criterion
    Karimpour, Jaber
    Lotfi, Shahriar
    Tajari Siahmarzkooh, Aliakbar
    TURKISH JOURNAL OF ELECTRICAL ENGINEERING AND COMPUTER SCIENCES, 2017, 25 (03) : 1963 - 1975
  • [34] A Network Intrusion Detection Algorithm Based on Outlier Mining
    Ding, Tianyi
    Zhang, Min
    He, Dongjie
    COMMUNICATIONS, SIGNAL PROCESSING, AND SYSTEMS, 2019, 463 : 1229 - 1236
  • [35] Quantum Evolutionary Algorithm Based Network Intrusion Detection
    Yin, Xiangdong
    ICCSIT 2010 - 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, VOL 4, 2010, : 683 - 685
  • [36] AdaBoost-based algorithm for network intrusion detection
    Hu, Weiming
    Hu, Wei
    Maybank, Steve
    IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART B-CYBERNETICS, 2008, 38 (02): : 577 - 583
  • [37] The Detection of Network Intrusion Based on Improved Adaboost Algorithm
    Wang, Quanmin
    Wei, Xuan
    2020 4TH INTERNATIONAL CONFERENCE ON CRYPTOGRAPHY, SECURITY AND PRIVACY (ICCSP 2020), 2020, : 84 - 88
  • [38] A Network Intrusion Detection Algorithm Based on FSA Model
    Wu, Fei
    Wu, Donghui
    Yang, Yingen
    PROCEEDINGS OF THE 2016 4TH INTERNATIONAL CONFERENCE ON MACHINERY, MATERIALS AND COMPUTING TECHNOLOGY, 2016, 60 : 615 - 621
  • [39] Intrusion Detection Algorithm Based on Residual Neural Network
    Cai, Zengyu
    Wang, Jingchao
    Zhang, Jianwei
    Si, Yajie
    International Journal of Network Security, 2022, 24 (06) : 1135 - 1141
  • [40] A Weighted Support Vector Clustering Algorithm and its Application in Network Intrusion Detection
    Sun, Sheng
    Wang, YuanZhen
    PROCEEDINGS OF THE FIRST INTERNATIONAL WORKSHOP ON EDUCATION TECHNOLOGY AND COMPUTER SCIENCE, VOL I, 2009, : 352 - +