Research on Alarm Reduction of Intrusion Detection System Based on Clustering and Whale Optimization Algorithm

被引:2
|
作者
Wang, Leiting [1 ]
Gu, Lize [1 ]
Tang, Yifan [1 ]
机构
[1] Beijing Univ Posts & Telecommun, Sch Cyberspace Secur, Beijing 100876, Peoples R China
来源
APPLIED SCIENCES-BASEL | 2021年 / 11卷 / 23期
关键词
intrusion detection system; whale optimization algorithm; alarm reduction; hierarchical clustering;
D O I
10.3390/app112311200
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
With the frequent occurrence of network security events, the intrusion detection system will generate alarm and log records when monitoring the network environment in which a large number of log and alarm records are redundant, which brings great burden to the server storage and security personnel. How to reduce the redundant alarm records in network intrusion detection has always been the focus of researchers. In this paper, we propose a method using the whale optimization algorithm to deal with massive redundant alarms. Based on the alarm hierarchical clustering, we integrate the whale optimization algorithm into the process of generating alarm hierarchical clustering and optimizing the cluster center and put forward two versions of local hierarchical clustering and global hierarchical clustering, respectively. To verify the feasibility of the algorithm, we conducted experiments on the UNSW-NB15 data set; compared with the previous alarm clustering algorithms, the alarm clustering algorithm based on the whale optimization algorithm can generate higher quality clustering in a shorter time. The results show that the proposed algorithm can effectively reduce redundant alarms and reduce the load of IDS and staff.
引用
收藏
页数:26
相关论文
共 50 条
  • [31] Design of network intrusion detection system based on parallel DPC clustering algorithm
    Wang, Jing
    Han, Dezhi
    INTERNATIONAL JOURNAL OF EMBEDDED SYSTEMS, 2020, 13 (03) : 318 - 327
  • [32] An Industrial Network Intrusion Detection Algorithm Based on Multifeature Data Clustering Optimization Model
    Liang, Wei
    Li, Kuan-Ching
    Long, Jing
    Kui, Xiaoyan
    Zomaya, Albert Y.
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2020, 16 (03) : 2063 - 2071
  • [33] An Improved Binary Whale Optimization Algorithm for Feature Selection of Network Intrusion Detection
    Xu, Hui
    Fu, Yingchun
    Fang, Ce
    Cao, Qianqian
    Su, Jun
    Wei, Siwei
    PROCEEDINGS OF THE 2018 IEEE 4TH INTERNATIONAL SYMPOSIUM ON WIRELESS SYSTEMS WITHIN THE INTERNATIONAL CONFERENCES ON INTELLIGENT DATA ACQUISITION AND ADVANCED COMPUTING SYSTEMS (IDAACS-SWS), 2018, : 10 - 15
  • [35] A Clustering Scheme Based on the Binary Whale Optimization Algorithm in FANET
    Yan, Yonghang
    Xia, Xuewen
    Zhang, Lingli
    Li, Zhijia
    Qin, Chunbin
    ENTROPY, 2022, 24 (10)
  • [36] Soft-computing-based false alarm reduction for hierarchical data of intrusion detection system
    Singh, Parminder
    Krishnamoorthy, Sujatha
    Nayyar, Anand
    Luhach, Ashish Kr
    Kaur, Avinash
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2019, 15 (10)
  • [37] Advanced Clustering Based Intrusion Detection (ACID) Algorithm
    Borah, Samarjeet
    Chakravorty, Debaditya
    Chawhan, Chandan
    Saha, Aritra
    ADVANCES IN COMPUTING AND COMMUNICATIONS, PT III, 2011, 192 : 35 - 43
  • [38] Application of Clustering Algorithm in Intrusion Detection Based on PCA
    Li, Han
    2015 International Conference on Software Engineering and Information System (SEIS 2015), 2015, : 239 - 244
  • [39] An intrusion detection system based on the clustering ensemble
    Weng, Fangfei
    Jiang, Qingshan
    Shi, Liang
    Wu, Nannan
    2007 INTERNATIONAL WORKSHOP ON ANTI-COUNTERFEITING, SECURITY, AND IDENTIFICATION, 2007, : 121 - +
  • [40] A survey on Clustering based Intrusion Detection System
    Singh, Amandeep
    Kumar, Naresh
    PROCEEDINGS OF 2019 5TH IEEE INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING, COMPUTING AND CONTROL (ISPCC 2K19), 2019, : 247 - 250