Random effects logistic regression model for anomaly detection

被引:41
作者
Mok, Min Seok [1 ]
Sohn, So Young [1 ]
Ju, Yong Han [1 ]
机构
[1] Yonsei Univ, Dept Informat & Ind Engn, Seoul 120749, South Korea
关键词
Anomaly detection; Intrusion; Random effects; KDD-99; INTRUSION DETECTION; DESIGN; ENSEMBLE; SYSTEM;
D O I
10.1016/j.eswa.2010.04.017
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
As the influence of the internet continues to expand as a medium for communications and commerce, the threat from spammers, system attackers, and criminal enterprises has grown accordingly. This paper proposes a random effects logistic regression model to predict anomaly detection. Unlike the previous studies on anomaly detection, a random effects model was applied, which accommodates not only the risk factors of the exposures but also the uncertainty not explained by such factors. The specific factors of the risk category such as retained 'protocol type' and 'logged in' are included in the proposed model. The research is based on a sample of 49,427 random observations for 42 variables of the KDD-cup 1999 (Data Mining and Knowledge Discovery competition) data set that contains 'normal' and 'anomaly' connections. The proposed model has a classification accuracy of 98.94% for the training data set, while that for the validation data set is 98.68%. (C) 2010 Elsevier Ltd. All rights reserved.
引用
收藏
页码:7162 / 7166
页数:5
相关论文
共 29 条
[1]  
Anderson D., 1995, Detecting unusual program behavior using the statistical component of the next-generation intrusion detection expert system nides
[2]  
[Anonymous], 1980, Computer Security Threat Monitoring and Surveillance
[3]   DADICC:: Intelligent system for anomaly detection in a combined cycle gas turbine plant [J].
Arranz, Antonio ;
Cruz, Alberto ;
Sanz-Bobi, Miguel A. ;
Ruiz, Pablo ;
Coutino, Josue .
EXPERT SYSTEMS WITH APPLICATIONS, 2008, 34 (04) :2267-2277
[4]  
BARBARD D, 2001, P 1 SIAM INT C DAT M
[5]   Feature deduction and ensemble design of intrusion detection systems [J].
Chebrolu, S ;
Abraham, A ;
Thomas, JP .
COMPUTERS & SECURITY, 2005, 24 (04) :295-307
[6]   An intelligent intrusion detection system (IDS) for anomaly and misuse detection in computer networks [J].
Depren, O ;
Topallar, M ;
Anarim, E ;
Ciliz, MK .
EXPERT SYSTEMS WITH APPLICATIONS, 2005, 29 (04) :713-722
[7]   PAID: A Probabilistic Agent-Based Intrusion Detection system [J].
Gowadia, V ;
Farkas, C ;
Valtorta, M .
COMPUTERS & SECURITY, 2005, 24 (07) :529-545
[8]   DDoS attack detection method using cluster analysis [J].
Lee, Keunsoo ;
Kim, Juhyun ;
Kwon, Ki Hoon ;
Han, Younggoo ;
Kim, Sehun .
EXPERT SYSTEMS WITH APPLICATIONS, 2008, 34 (03) :1659-1665
[9]   A data mining framework for building intrusion detection models [J].
Lee, W ;
Stolfo, SJ ;
Mok, KW .
PROCEEDINGS OF THE 1999 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, 1999, :120-132
[10]   Anomaly-based intrusion detection: privacy concerns and other problems [J].
Lundin, E ;
Jonsson, E .
COMPUTER NETWORKS, 2000, 34 (04) :623-640