A Membership Function Detection of Low for Intrusion and Anomaly Frequency Attacks

被引:1
|
作者
Nagaraja, Arun [1 ]
Kiran, V. Sravan [2 ]
Prabhakara, H. S. [3 ]
Rajasekhar, N. [4 ]
机构
[1] Jain Univ, SET, Comp Sci & Engn Dept, Bangalore, Karnataka, India
[2] St Martins Engn Coll, Informat Technol Dept, Hyderabad, India
[3] Malnad Coll Engn, Informat Sci & Engn Dept, Hasan, Karnataka, India
[4] IARE Autonomous, Dept Comp Sci & Engn, Hyderabad, India
关键词
Intrusion; Anomaly; Classification; Detection; Membership; DETECTION SYSTEM; SIMILARITY MEASURE;
D O I
10.1145/3279996.3280031
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
The ultimate objective of intrusion detection problem is to identify surprising intrusions that compromise networks. Determining intrusions through the application of classifiers or detection algorithm requires, finding similarity as one of the important operations. This paper brings to the discussion a membership function that can be used for the learning process to attain better accuracies for low-frequency attack classes in the given dataset. Two membership functions are proposed in this work for unsupervised learning. The first one is utilized for prior learning and the second one is utilized for post-learning. The learning process is an un-supervised technique that aims at dimensionality transformation.
引用
收藏
页数:6
相关论文
共 50 条
  • [41] Network Attacks and Intrusion Detection System: A Brief
    Sharma, Neha V.
    Kavita
    Agarwal, Gaurav
    2019 2ND INTERNATIONAL CONFERENCE ON INTELLIGENT COMMUNICATION AND COMPUTATIONAL TECHNIQUES (ICCT), 2019, : 280 - 283
  • [42] Influence of DoS Attacks on Intrusion Detection Systems
    Titorenko, Aleksey A.
    Goncharov, Dmitry E.
    PROCEEDINGS OF THE 2018 IEEE CONFERENCE OF RUSSIAN YOUNG RESEARCHERS IN ELECTRICAL AND ELECTRONIC ENGINEERING (EICONRUS), 2018, : 144 - 146
  • [43] Automatic Clustering of Attacks in Intrusion Detection Systems
    Shojafar, Mohammad
    Taheri, Rahim
    Pooranian, Zahra
    Javidan, Reza
    Miri, Ali
    Jararweh, Yaser
    2019 IEEE/ACS 16TH INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS (AICCSA 2019), 2019,
  • [44] Anomaly Intrusion Detection based on Concept Lattice
    Wang, Li-fang
    ADVANCES IN MANUFACTURING TECHNOLOGY, PTS 1-4, 2012, 220-223 : 2388 - 2392
  • [45] A new similarity measure for the anomaly intrusion detection
    Belkhirat, Ahmed
    Bouras, Abdelghani
    Belkhir, Abdelkader
    NSS: 2009 3RD INTERNATIONAL CONFERENCE ON NETWORK AND SYSTEM SECURITY, 2009, : 431 - +
  • [46] Intrusion, anomaly, and attack detection in smart vehicles
    Banafshehvaragh, Samira Tahajomi
    Rahmani, Amir Masoud
    MICROPROCESSORS AND MICROSYSTEMS, 2023, 96
  • [47] An intrusion detection system for detecting phishing attacks
    Pamunuwa, Hasika
    Wijesekera, Duminda
    Farkas, Csilla
    SECURE DATA MANAGEMENT, PROCEEDINGS, 2007, 4721 : 181 - +
  • [48] A survey of coordinated attacks and collaborative intrusion detection
    Zhou, Chenfeng Vincent
    Leckie, Christopher
    Karunasekera, Shanika
    COMPUTERS & SECURITY, 2010, 29 (01) : 124 - 140
  • [49] Intrusion cancellation for anomaly detection in healthcare applications
    Mohamed, Mbarka Belhaj
    Meddeb-Makhlouf, Amel
    Fakhfakh, Ahmed
    2019 15TH INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE (IWCMC), 2019, : 313 - 318
  • [50] Decision trees approach for anomaly intrusion detection
    Nagata, Tomokazu
    Lee, Jaeho
    Su, Wenhung
    Kinjo, Atsushi
    Shiroma, Tadashi
    Taniguchi, Yuji
    Tamaki, Shiro
    INFORMATION-AN INTERNATIONAL INTERDISCIPLINARY JOURNAL, 2007, 10 (05): : 619 - 630