Research on Alarm Reduction of Intrusion Detection System Based on Clustering and Whale Optimization Algorithm

被引:2
|
作者
Wang, Leiting [1 ]
Gu, Lize [1 ]
Tang, Yifan [1 ]
机构
[1] Beijing Univ Posts & Telecommun, Sch Cyberspace Secur, Beijing 100876, Peoples R China
来源
APPLIED SCIENCES-BASEL | 2021年 / 11卷 / 23期
关键词
intrusion detection system; whale optimization algorithm; alarm reduction; hierarchical clustering;
D O I
10.3390/app112311200
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
With the frequent occurrence of network security events, the intrusion detection system will generate alarm and log records when monitoring the network environment in which a large number of log and alarm records are redundant, which brings great burden to the server storage and security personnel. How to reduce the redundant alarm records in network intrusion detection has always been the focus of researchers. In this paper, we propose a method using the whale optimization algorithm to deal with massive redundant alarms. Based on the alarm hierarchical clustering, we integrate the whale optimization algorithm into the process of generating alarm hierarchical clustering and optimizing the cluster center and put forward two versions of local hierarchical clustering and global hierarchical clustering, respectively. To verify the feasibility of the algorithm, we conducted experiments on the UNSW-NB15 data set; compared with the previous alarm clustering algorithms, the alarm clustering algorithm based on the whale optimization algorithm can generate higher quality clustering in a shorter time. The results show that the proposed algorithm can effectively reduce redundant alarms and reduce the load of IDS and staff.
引用
收藏
页数:26
相关论文
共 50 条
  • [1] MapReduce Intrusion Detection System based on a Particle Swarm Optimization Clustering Algorithm
    Aljarah, Ibrahim
    Ludwig, Simone A.
    2013 IEEE CONGRESS ON EVOLUTIONARY COMPUTATION (CEC), 2013, : 955 - 962
  • [2] The Research of Intrusion Detection Based on Mixed Clustering Algorithm
    Liu, Nanyan
    COMPUTATIONAL INTELLIGENCE AND INTELLIGENT SYSTEMS, 2012, 316 : 92 - 100
  • [3] Intrusion Detection Alarm Filtering Technology Based on Ant Colony Clustering Algorithm
    Yang, Xu
    Hui, Zhao
    PROCEEDINGS 2015 SIXTH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS DESIGN AND ENGINEERING APPLICATIONS ISDEA 2015, 2015, : 470 - 473
  • [4] An Intrusion Detection Model Based on Improved Whale Optimization Algorithm and XGBoost
    Zong, Xinlu
    Li, Ruicheng
    Ye, Zhiwei
    PROCEEDINGS OF THE THE 11TH IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT DATA ACQUISITION AND ADVANCED COMPUTING SYSTEMS: TECHNOLOGY AND APPLICATIONS (IDAACS'2021), VOL 1, 2021, : 542 - 547
  • [5] Intrusion detection System based on Hybrid Whale-Genetic Algorithm
    Bilaiya, Riya
    Sharma, Rajeev Mohan
    PROCEEDINGS OF THE 2018 SECOND INTERNATIONAL CONFERENCE ON INVENTIVE COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES (ICICCT), 2018, : 822 - 825
  • [6] Intrusion detection system based on the beetle swarm optimization and K-RMS clustering algorithm
    Pran, S. Gokul
    Raja, Sivakami
    Jeyasudha, S.
    INTERNATIONAL JOURNAL OF ADAPTIVE CONTROL AND SIGNAL PROCESSING, 2024, 38 (05) : 1675 - 1689
  • [7] Research on Network Intrusion Detection System Based on Improved K-means Clustering Algorithm
    Li Tian
    Wang Jianwen
    2009 INTERNATIONAL FORUM ON COMPUTER SCIENCE-TECHNOLOGY AND APPLICATIONS, VOL 1, PROCEEDINGS, 2009, : 76 - 79
  • [8] The Application of Clustering Algorithm in Intrusion Detection System
    Ge, Lei
    Zhang, CaiQian
    ADVANCES IN FUTURE COMPUTER AND CONTROL SYSTEMS, VOL 1, 2012, 159 : 77 - 82
  • [9] Parallel clustering algorithm in intrusion detection system
    Li, Qinghua
    Su, Shan
    Jisuanji Gongcheng/Computer Engineering, 2005, 31 (05): : 151 - 152
  • [10] Research on the Network Intrusion Detection System based on Modified Particle Swarm Optimization Algorithm
    Wang, Xuesong
    Feng, Guangzhan
    PROCEEDINGS OF THE 2016 2ND INTERNATIONAL CONFERENCE ON SOCIAL SCIENCE AND TECHNOLOGY EDUCATION (ICSSTE 2016), 2016, 55 : 634 - 639