An Intrusion Detection mechanism based on feature based data clustering

被引:1
|
作者
Das, Debasish [1 ]
Sharma, Utpal [1 ]
Bhattacharyya, D. K. [1 ]
机构
[1] Tezpur Univ, Dept Comp Sci & Engn, Tezpur, India
关键词
intrusion detection; centroid vector; volume rank; projected featur; low false alarm;
D O I
10.1109/ICET.2008.4777495
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Recently clustering methods have gained importance in addressing network security issues, including network intrusion detection. In clustering, unsupervised anomaly detection has great utility within the context of intrusion detection system. Such a system can work without the need for massive sets of pre-labeled training data. Intrusion detection system (IDS) aims to identify attacks with a high detection rate and a low false alarm rate. This paper presents a scheme to achieve this goal. The scheme is designed based on an unsupervised clustering and a labeling technique. The technique has been found to perform with high precision at low false alarm rate over KDD99 dataset.
引用
收藏
页码:172 / 175
页数:4
相关论文
共 50 条
  • [41] Application of Clustering Algorithm in Intrusion Detection Based on PCA
    Li, Han
    2015 International Conference on Software Engineering and Information System (SEIS 2015), 2015, : 239 - 244
  • [42] Network intrusion detection based on artificial immune clustering
    Zhong, J. (zhongjiang@cqu.edu.cn), 1600, Binary Information Press, Flat F 8th Floor, Block 3, Tanner Garden, 18 Tanner Road, Hong Kong (10):
  • [43] Advanced Clustering Based Intrusion Detection (ACID) Algorithm
    Borah, Samarjeet
    Chakravorty, Debaditya
    Chawhan, Chandan
    Saha, Aritra
    ADVANCES IN COMPUTING AND COMMUNICATIONS, PT III, 2011, 192 : 35 - 43
  • [44] Threshold-based clustering for intrusion detection systems
    Nikulin, Vladimir
    DATA MINING, INTRUSION DETECTION, INFORMATION ASSURANCE, AND DATA NETWORKS SECURITY 2006, 2006, 6241
  • [46] The Research of Intrusion Detection Model Based on Clustering Analysis
    Li Bo
    Jiang Dong-Dong
    PROCEEDINGS OF THE 2009 INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2009, : 24 - 27
  • [47] An Industrial Network Intrusion Detection Algorithm Based on Multifeature Data Clustering Optimization Model
    Liang, Wei
    Li, Kuan-Ching
    Long, Jing
    Kui, Xiaoyan
    Zomaya, Albert Y.
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2020, 16 (03) : 2063 - 2071
  • [48] Network Intrusion Traffic Detection Based on Feature Extraction
    Yu, Xuecheng
    Huang, Yan
    Zhang, Yu
    Song, Mingyang
    Jia, Zhenhong
    CMC-COMPUTERS MATERIALS & CONTINUA, 2024, 78 (01): : 473 - 492
  • [49] INTRUSION DETECTION BASED ON MACHINE LEARNING AND FEATURE SELECTION
    Alaoui, Souad
    El Gonnouni, Amina
    Lyhyaoui, Abdelouahid
    MENDEL 2011 - 17TH INTERNATIONAL CONFERENCE ON SOFT COMPUTING, 2011, : 199 - 206
  • [50] Intrusion detection based on hybrid metaheuristic feature selection
    Zhang, Fengjun
    Huang, Lisheng
    Shi, Kai
    Zhai, Shengjie
    Lan, Yunhai
    Li, Qinghua
    COMPUTER JOURNAL, 2024,