Research on Alarm Reduction of Intrusion Detection System Based on Clustering and Whale Optimization Algorithm

被引:2
|
作者
Wang, Leiting [1 ]
Gu, Lize [1 ]
Tang, Yifan [1 ]
机构
[1] Beijing Univ Posts & Telecommun, Sch Cyberspace Secur, Beijing 100876, Peoples R China
来源
APPLIED SCIENCES-BASEL | 2021年 / 11卷 / 23期
关键词
intrusion detection system; whale optimization algorithm; alarm reduction; hierarchical clustering;
D O I
10.3390/app112311200
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
With the frequent occurrence of network security events, the intrusion detection system will generate alarm and log records when monitoring the network environment in which a large number of log and alarm records are redundant, which brings great burden to the server storage and security personnel. How to reduce the redundant alarm records in network intrusion detection has always been the focus of researchers. In this paper, we propose a method using the whale optimization algorithm to deal with massive redundant alarms. Based on the alarm hierarchical clustering, we integrate the whale optimization algorithm into the process of generating alarm hierarchical clustering and optimizing the cluster center and put forward two versions of local hierarchical clustering and global hierarchical clustering, respectively. To verify the feasibility of the algorithm, we conducted experiments on the UNSW-NB15 data set; compared with the previous alarm clustering algorithms, the alarm clustering algorithm based on the whale optimization algorithm can generate higher quality clustering in a shorter time. The results show that the proposed algorithm can effectively reduce redundant alarms and reduce the load of IDS and staff.
引用
收藏
页数:26
相关论文
共 50 条
  • [21] An Intrusion Detection Research Based on Spectral Clustering
    Luo Min
    Li Xiaohong
    Xie Shouhe
    2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 4599 - +
  • [22] Research on the Detection of Network Intrusion Prevention with SVM Based Optimization Algorithm
    Wang, Debing
    Xu, Guangyu
    INFORMATICA-AN INTERNATIONAL JOURNAL OF COMPUTING AND INFORMATICS, 2020, 44 (02): : 269 - 273
  • [23] A Parallel Clustering Ensemble Algorithm for Intrusion Detection System
    Gao, Hongwei
    Zhu, Dingju
    Wang, Xiaomin
    PROCEEDINGS OF THE NINTH INTERNATIONAL SYMPOSIUM ON DISTRIBUTED COMPUTING AND APPLICATIONS TO BUSINESS, ENGINEERING AND SCIENCE (DCABES 2010), 2010, : 450 - 453
  • [24] APPLICATION OF FUZZY CLUSTERING ALGORITHM IN INTRUSION DETECTION SYSTEM
    Li Yun
    Wu Jie-fang
    Liu Xue-cheng
    3RD INTERNATIONAL SYMPOSIUM ON INFORMATION ENGINEERING AND ELECTRONIC COMMERCE (IEEC 2011), PROCEEDINGS, 2011, : 297 - 300
  • [25] An enhanced whale optimization algorithm for clustering
    Singh, Hakam
    Rai, Vipin
    Kumar, Neeraj
    Dadheech, Pankaj
    Kotecha, Ketan
    Selvachandran, Ganeshsree
    Abraham, Ajith
    MULTIMEDIA TOOLS AND APPLICATIONS, 2023, 82 (03) : 4599 - 4618
  • [26] An enhanced whale optimization algorithm for clustering
    Hakam Singh
    Vipin Rai
    Neeraj Kumar
    Pankaj Dadheech
    Ketan Kotecha
    Ganeshsree Selvachandran
    Ajith Abraham
    Multimedia Tools and Applications, 2023, 82 : 4599 - 4618
  • [27] A clustering algorithm for intrusion detection
    Wang, Q
    Megalooikonomou, V
    DATA MINING, INTRUSION DETECTION, INFORMATION ASSURANCE, AND DATA NETWORKS SECURITY 2005, 2005, 5812 : 31 - 38
  • [28] Alarm clustering for intrusion detection systems in computer networks
    Giacinto, G
    Perdisci, R
    Roli, F
    MACHINE LEARNING AND DATA MINING IN PATTERN RECOGNITION, PROCEEDINGS, 2005, 3587 : 184 - 193
  • [29] Alarm clustering for intrusion detection systems in computer networks
    Perdisci, Roberto
    Giacinto, Giorgio
    Roli, Fabio
    ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE, 2006, 19 (04) : 429 - 438
  • [30] Clustering Algorithm Based on Outlier Detection for Anomaly Intrusion Detection
    Yin, Shang-Nan
    Kang, Ho-Seok
    Kim, Sung-Ryul
    JOURNAL OF INTERNET TECHNOLOGY, 2016, 17 (02): : 291 - 299