An Intrusion Detection mechanism based on feature based data clustering

被引:1
|
作者
Das, Debasish [1 ]
Sharma, Utpal [1 ]
Bhattacharyya, D. K. [1 ]
机构
[1] Tezpur Univ, Dept Comp Sci & Engn, Tezpur, India
关键词
intrusion detection; centroid vector; volume rank; projected featur; low false alarm;
D O I
10.1109/ICET.2008.4777495
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Recently clustering methods have gained importance in addressing network security issues, including network intrusion detection. In clustering, unsupervised anomaly detection has great utility within the context of intrusion detection system. Such a system can work without the need for massive sets of pre-labeled training data. Intrusion detection system (IDS) aims to identify attacks with a high detection rate and a low false alarm rate. This paper presents a scheme to achieve this goal. The scheme is designed based on an unsupervised clustering and a labeling technique. The technique has been found to perform with high precision at low false alarm rate over KDD99 dataset.
引用
收藏
页码:172 / 175
页数:4
相关论文
共 50 条
  • [31] CBFS: A Clustering-Based Feature Selection Mechanism for Network Anomaly Detection
    Mao, Jiewen
    Hu, Yongquan
    Jiang, Dong
    Wei, Tongquan
    Shen, Fuke
    IEEE ACCESS, 2020, 8 : 116216 - 116225
  • [32] Intrusion Detection Based on Data Mining
    Oreku, George S.
    Mtenzi, Fredrick J.
    EIGHTH IEEE INTERNATIONAL CONFERENCE ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, PROCEEDINGS, 2009, : 696 - 701
  • [33] Intrusion detection based on data mining
    Yin, Jian
    Mei, Fang
    Zhang, Gang
    COMPUTATIONAL INTELLIGENCE, PT 2, PROCEEDINGS, 2006, 4114 : 724 - 729
  • [34] An intrusion detection method based on clustering multidimensional sets
    Zhong, Yong
    Qin, Xiao-Lin
    Lin, Dong-Mei
    PROCEEDINGS OF 2006 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2006, : 2799 - +
  • [35] KFDA and clustering based multiclass SVM for intrusion detection
    Institute of Communication Networks Intergrated Technique, Beijing University of Posts and Telecommunications, Beijing, 100876, China
    Journal of China Universities of Posts and Telecommunications, 2008, 15 (01): : 123 - 128
  • [36] False Positive Elimination in Intrusion Detection Based on Clustering
    Hu, Liang
    Li, Taihui
    Xie, Nannan
    Hu, Jiejun
    2015 12TH INTERNATIONAL CONFERENCE ON FUZZY SYSTEMS AND KNOWLEDGE DISCOVERY (FSKD), 2015, : 519 - 523
  • [37] Clustering-Based Network Intrusion Detection System
    Fan, Chun-I
    Lai, Yen-Lin
    Shie, Cheng-Han
    2022 5TH IEEE CONFERENCE ON DEPENDABLE AND SECURE COMPUTING (IEEE DSC 2022), 2022,
  • [38] MULTILAYER INTRUSION DETECTION SYSTEM BASED ON SEMISUPERVISED CLUSTERING
    Wang, Caihong
    Huang, Run
    Zhang, Weihang
    Sun, Jian
    2019 16TH INTERNATIONAL COMPUTER CONFERENCE ON WAVELET ACTIVE MEDIA TECHNOLOGY AND INFORMATION PROCESSING (ICWAMTIP), 2019, : 355 - 360
  • [39] The Research of Intrusion Detection Based on Mixed Clustering Algorithm
    Liu, Nanyan
    COMPUTATIONAL INTELLIGENCE AND INTELLIGENT SYSTEMS, 2012, 316 : 92 - 100
  • [40] Wireless Intrusion Detection Based on Different Clustering Approaches
    Nambiar, Athira. M.
    Vijayan, Asha
    Nandakumar, Aishwarya
    PROCEEDINGS OF THE FIRST AMRITA ACM-W CELEBRATION OF WOMEN IN COMPUTING IN INDIA (A2WIC), 2010,