A Membership Function Detection of Low for Intrusion and Anomaly Frequency Attacks

被引:1
|
作者
Nagaraja, Arun [1 ]
Kiran, V. Sravan [2 ]
Prabhakara, H. S. [3 ]
Rajasekhar, N. [4 ]
机构
[1] Jain Univ, SET, Comp Sci & Engn Dept, Bangalore, Karnataka, India
[2] St Martins Engn Coll, Informat Technol Dept, Hyderabad, India
[3] Malnad Coll Engn, Informat Sci & Engn Dept, Hasan, Karnataka, India
[4] IARE Autonomous, Dept Comp Sci & Engn, Hyderabad, India
关键词
Intrusion; Anomaly; Classification; Detection; Membership; DETECTION SYSTEM; SIMILARITY MEASURE;
D O I
10.1145/3279996.3280031
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
The ultimate objective of intrusion detection problem is to identify surprising intrusions that compromise networks. Determining intrusions through the application of classifiers or detection algorithm requires, finding similarity as one of the important operations. This paper brings to the discussion a membership function that can be used for the learning process to attain better accuracies for low-frequency attack classes in the given dataset. Two membership functions are proposed in this work for unsupervised learning. The first one is utilized for prior learning and the second one is utilized for post-learning. The learning process is an un-supervised technique that aims at dimensionality transformation.
引用
收藏
页数:6
相关论文
共 50 条
  • [21] Intelligent progression for anomaly intrusion detection
    Marimuthu, A.
    Shanmugam, A.
    2008 6TH INTERNATIONAL SYMPOSIUM ON APPLIED MACHINE INTELLIGENCE AND INFORMATICS, 2008, : 242 - +
  • [22] A Fuzzy Measure for Intrusion and Anomaly Detection
    Aljawarneh, Shadi A.
    RadhaKrishna, V.
    Kumar, G. Rajesh
    2017 INTERNATIONAL CONFERENCE ON ENGINEERING & MIS (ICEMIS), 2017,
  • [23] Anomaly-Based Intrusion Detection by Machine Learning: A Case Study on Probing Attacks to an Institutional Network
    Tufan, Emrah
    Tezcan, Cihangir
    Acarturk, Cengiz
    IEEE ACCESS, 2021, 9 : 50078 - 50092
  • [24] Anomaly-based network intrusion detection using denoising autoencoder and Wasserstein GAN synthetic attacks
    Arafah, Mohammad
    Phillips, Iain
    Adnane, Asma
    Hadi, Wael
    Alauthman, Mohammad
    Al-Banna, Abedal-Kareem
    APPLIED SOFT COMPUTING, 2025, 168
  • [25] An Approach to Improving Intrusion Detection System Performance Against Low Frequent Attacks
    Mohamed, Yasir A.
    Salih, Dina A.
    Khanan, Akbar
    JOURNAL OF ADVANCES IN INFORMATION TECHNOLOGY, 2023, 14 (03) : 472 - 478
  • [26] A grid-based clustering for low-overhead anomaly intrusion detection
    Zhong Y.
    Yamaki H.
    Takakura H.
    Proceedings - 2011 5th International Conference on Network and System Security, NSS 2011, 2011, : 17 - 24
  • [27] Intrusion detection and defence for CAN bus through frequency anomaly analysis and arbitration mechanism
    Dong, Qiang
    Song, Zenglu
    Shao, Haoshu
    ELECTRONICS LETTERS, 2024, 60 (03)
  • [28] Detection of Membership Inference Attacks on GAN Models
    Ekramifard, Ala
    Amintoosi, Haleh
    Seno, Seyed Amin Hosseini
    ISECURE-ISC INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2025, 17 (01): : 43 - 57
  • [29] Two Stage Anomaly Detection for Network Intrusion Detection
    Neuschmied, Helmut
    Winter, Martin
    Hofer-Schmitz, Katharina
    Stojanovic, Branka
    Kleb, Ulrike
    ICISSP: PROCEEDINGS OF THE 7TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2021, : 450 - 457
  • [30] Detection of DoS attacks using intrusion detection sensors
    Ramakrishna, P
    Maarof, MA
    APOC 2002: ASIA-PACIFIC OPTICAL AND WIRELESS COMMUNICATIONS; NETWORK DESIGN AND MANAGEMENT, 2002, 4909 : 69 - 80