A Membership Function Detection of Low for Intrusion and Anomaly Frequency Attacks

被引:1
|
作者
Nagaraja, Arun [1 ]
Kiran, V. Sravan [2 ]
Prabhakara, H. S. [3 ]
Rajasekhar, N. [4 ]
机构
[1] Jain Univ, SET, Comp Sci & Engn Dept, Bangalore, Karnataka, India
[2] St Martins Engn Coll, Informat Technol Dept, Hyderabad, India
[3] Malnad Coll Engn, Informat Sci & Engn Dept, Hasan, Karnataka, India
[4] IARE Autonomous, Dept Comp Sci & Engn, Hyderabad, India
关键词
Intrusion; Anomaly; Classification; Detection; Membership; DETECTION SYSTEM; SIMILARITY MEASURE;
D O I
10.1145/3279996.3280031
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
The ultimate objective of intrusion detection problem is to identify surprising intrusions that compromise networks. Determining intrusions through the application of classifiers or detection algorithm requires, finding similarity as one of the important operations. This paper brings to the discussion a membership function that can be used for the learning process to attain better accuracies for low-frequency attack classes in the given dataset. Two membership functions are proposed in this work for unsupervised learning. The first one is utilized for prior learning and the second one is utilized for post-learning. The learning process is an un-supervised technique that aims at dimensionality transformation.
引用
收藏
页数:6
相关论文
共 50 条
  • [31] Anomaly detection enhanced classification in computer intrusion detection
    Fugate, M
    Gattiker, JR
    PATTERN RECOGNITION WITH SUPPORT VECTOR MACHINES, PROCEEDINGS, 2002, 2388 : 186 - 197
  • [32] An Advanced Fitness Function Optimization Algorithm for Anomaly Intrusion Detection Using Feature Selection
    Hong, Sung-Sam
    Lee, Eun-joo
    Kim, Hwayoung
    APPLIED SCIENCES-BASEL, 2023, 13 (08):
  • [33] Fast Activation Function Approach for Deep Learning Based Online Anomaly Intrusion Detection
    Alrawashdeh, Khaled
    Purdy, Carla
    2018 IEEE 4TH INTERNATIONAL CONFERENCE ON BIG DATA SECURITY ON CLOUD (BIGDATASECURITY), 4THIEEE INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE AND SMART COMPUTING, (HPSC) AND 3RD IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT DATA AND SECURITY (IDS), 2018, : 5 - 13
  • [34] Early Intrusion Detection for OS Scan Attacks
    Lopez-Vizcaino, Manuel
    Novoa, Francisco J.
    Fernandez, Diego
    Carneiro, Victor
    Cacheda, Fidel
    2019 IEEE 18TH INTERNATIONAL SYMPOSIUM ON NETWORK COMPUTING AND APPLICATIONS (NCA), 2019, : 209 - 213
  • [35] Messaging Attacks on Android: Vulnerabilities and Intrusion Detection
    Hamandi, Khodor
    Salman, Alaa
    Elhajj, Imad H.
    Chehab, Ali
    Kayssi, Ayman
    MOBILE INFORMATION SYSTEMS, 2015, 2015
  • [36] Intrusion detection for routing attacks in sensor networks
    Loo, Chong Eik
    Ng, Mun Yong
    Leckie, Christopher
    Palaniswami, Marimuthu
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2006, 2 (04): : 313 - 332
  • [37] A Survey on Network Attacks and Intrusion Detection Systems
    Latha, S.
    Prakash, Sinthu Janita
    2017 4TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING AND COMMUNICATION SYSTEMS (ICACCS), 2017,
  • [38] The countermeasure for IP fragment attacks in intrusion detection
    Zhong, L
    Feng, S
    Shen, Q
    Proceedings of the Third International Symposium on Magnetic Industry (ISMI'04) & First International Symposium on Physics and IT Industry (ISITI'04), 2005, : 284 - 286
  • [39] Hybrid Intrusion Detection System for DDoS Attacks
    Cepheli, Ozge
    Buyukcorak, Saliha
    Kurt, Gunes Karabulut
    JOURNAL OF ELECTRICAL AND COMPUTER ENGINEERING, 2016, 2016
  • [40] Anomaly intrusion detection method based on HMM
    Qiao, Y
    Xin, XW
    Bin, Y
    Ge, S
    ELECTRONICS LETTERS, 2002, 38 (13) : 663 - 664