Research on Alarm Reduction of Intrusion Detection System Based on Clustering and Whale Optimization Algorithm

被引:2
|
作者
Wang, Leiting [1 ]
Gu, Lize [1 ]
Tang, Yifan [1 ]
机构
[1] Beijing Univ Posts & Telecommun, Sch Cyberspace Secur, Beijing 100876, Peoples R China
来源
APPLIED SCIENCES-BASEL | 2021年 / 11卷 / 23期
关键词
intrusion detection system; whale optimization algorithm; alarm reduction; hierarchical clustering;
D O I
10.3390/app112311200
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
With the frequent occurrence of network security events, the intrusion detection system will generate alarm and log records when monitoring the network environment in which a large number of log and alarm records are redundant, which brings great burden to the server storage and security personnel. How to reduce the redundant alarm records in network intrusion detection has always been the focus of researchers. In this paper, we propose a method using the whale optimization algorithm to deal with massive redundant alarms. Based on the alarm hierarchical clustering, we integrate the whale optimization algorithm into the process of generating alarm hierarchical clustering and optimizing the cluster center and put forward two versions of local hierarchical clustering and global hierarchical clustering, respectively. To verify the feasibility of the algorithm, we conducted experiments on the UNSW-NB15 data set; compared with the previous alarm clustering algorithms, the alarm clustering algorithm based on the whale optimization algorithm can generate higher quality clustering in a shorter time. The results show that the proposed algorithm can effectively reduce redundant alarms and reduce the load of IDS and staff.
引用
收藏
页数:26
相关论文
共 50 条
  • [41] An Enhanced Intrusion Detection System Based on Clustering
    Borah, Samarjeet
    Panigrahi, Ranjit
    Chakraborty, Anindita
    PROGRESS IN ADVANCED COMPUTING AND INTELLIGENT ENGINEERING, VOL 2, 2018, 564 : 37 - 45
  • [42] Research of WaveCluster Algorithm in Intrusion Detection System
    Zhao, Mingwei
    Liu, Yang
    Jiang, Rong'an
    2008 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, VOLS 1 AND 2, PROCEEDINGS, 2008, : 259 - 263
  • [43] Research on Intrusion Detection System Based on Clustering Fuzzy Support Vector Machine
    Zhai Jinbiao
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2014, 8 (03): : 249 - 260
  • [44] Distributing Intrusion Detection System Based on Associated Trust Alarm
    Zhang, Qingguo
    Wang, Shaojie
    Zheng, Xuefeng
    Chu, Lijun
    Suo, Yanfeng
    2010 INTERNATIONAL CONFERENCE ON INFORMATION, ELECTRONIC AND COMPUTER SCIENCE, VOLS 1-3, 2010, : 1400 - +
  • [45] Research on the Application of Distributed Intrusion Detection System Based on Election Algorithm
    Wang, Wuqi
    Yang, Zhi-min
    Peng, Gong
    HUMAN CENTERED COMPUTING, HCC 2014, 2015, 8944 : 670 - 676
  • [46] Research on hybrid intrusion detection based on improved Harris Hawk optimization algorithm
    Zhou, Pengzhen
    Zhang, Huifu
    Liang, Wei
    CONNECTION SCIENCE, 2023, 35 (01)
  • [47] The Research of Intrusion Detection Model Based on Clustering Analysis
    Li Bo
    Jiang Dong-Dong
    PROCEEDINGS OF THE 2009 INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2009, : 24 - 27
  • [48] WOCDA: A whale optimization based community detection algorithm
    Zhang, Yun
    Liu, Yongguo
    Li, Jieting
    Zhu, Jiajing
    Yang, Changhong
    Yang, Wen
    Wen, Chuanbiao
    PHYSICA A-STATISTICAL MECHANICS AND ITS APPLICATIONS, 2020, 539
  • [49] A whale optimization algorithm (WOA) approach for clustering
    Nasiri, Jhila
    Khiyabani, Farzin Modarres
    COGENT MATHEMATICS & STATISTICS, 2018, 5 (01):
  • [50] An Adaptive Clustering Algorithm for Intrusion Detection
    QIU JuliNormal University of AnshanAnshanChina
    现代电子技术, 2007, (02) : 130 - 132