UTTAMA: An Intrusion Detection System Based on Feature Clustering and Feature Transformation

被引:0
|
作者
Arun Nagaraja
B. Uma
Rajesh kumar Gunupudi
机构
[1] Jain University,Department of Information Science and Engineering
[2] Malnad College of Engineering,Department of Information Science and Engineering
[3] VNR Vignana Jyothi Institute of Engineering and Technology,Department of Information Technology
来源
Foundations of Science | 2020年 / 25卷
关键词
Anomaly; Intrusion; Classifier; Outlier; Clustering; Dimensionality; Feature extraction;
D O I
暂无
中图分类号
学科分类号
摘要
Detecting Intrusions and anomalies is becoming much more challenging with new attacks popping out over a period of time. Achieving better accuracies by applying benchmark classifier algorithms used for identifying intrusions and anomalies have several hidden data mining challenges. Although neglected by many research findings, one of the most important and biggest challenges is the similarity or membership computation. Another challenge that cannot be simply neglected is the number of features that attributes to dimensionality. This research aims to come up with a new membership function to carry similarity computation that can be helpful for addressing feature dimensionality issues. In principle, this work is aimed at introducing a novel membership function that can help to achieve better classification accuracies and eventually lead to better intrusion and anomaly detection. Experiments are performed on KDD dataset with 41 attributes and also KDD dataset with 19 attributes. Recent approaches CANN and CLAPP have showed new approaches for intrusion detection. The proposed classifier is named as UTTAMA. UTTAMA performed better to both CANN and CLAPP approaches w.r.t overall classifier accuracy. Another promising outcome achieved using UTTAMA is the U2R and R2L attack accuracies. The importance of proposed approach is that the accuracy achieved using proposed approach outperforms CLAPP, CANN, SVM, KNN and other existing classifiers.
引用
收藏
页码:1049 / 1075
页数:26
相关论文
共 50 条
  • [21] Artificial immune system based intrusion detection: anomaly detection and feature selection
    Abas, Eman Abd El Raoof
    Abdelkader, Hatem
    Keshk, Arabi
    2015 IEEE SEVENTH INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND INFORMATION SYSTEMS (ICICIS), 2015, : 542 - 546
  • [22] Feature Selection Based on Cross-Correlation for the Intrusion Detection System
    Farahani, Gholamreza
    SECURITY AND COMMUNICATION NETWORKS, 2020, 2020
  • [23] Vitality Based Feature Selection For Intrusion Detection
    Jupriyadi
    Kistijantoro, Achmad Imam
    2014 International Conference of Advanced Informatics: Concept, Theory and Application (ICAICTA), 2014, : 93 - 96
  • [24] Evolutionary Algorithm-based Feature Selection for an Intrusion Detection System
    Singh, Devendra Kumar
    Shrivastava, Manish
    ENGINEERING TECHNOLOGY & APPLIED SCIENCE RESEARCH, 2021, 11 (03) : 7130 - 7134
  • [25] INTRUSION DETECTION SYSTEM BASED ON FEATURE SELECTION AND SUPPORT VECTOR MACHINE
    Zhang Xue-qin
    Gu Chun-hua
    Lin Jia-jun
    2006 FIRST INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND NETWORKING IN CHINA, 2006,
  • [26] An Intrusion Detection Algorithm Based on Feature Graph
    Yu, Xiang
    Tian, Zhihong
    Qiu, Jing
    Su, Shen
    Yan, Xiaoran
    CMC-COMPUTERS MATERIALS & CONTINUA, 2019, 61 (01): : 255 - 273
  • [27] A Hybrid Intrusion Detection System Based on Feature Selection and Voting Classifier
    Liu, Rong
    Chen, Zemao
    Liu, Jiayi
    2023 IEEE 47TH ANNUAL COMPUTERS, SOFTWARE, AND APPLICATIONS CONFERENCE, COMPSAC, 2023, : 203 - 212
  • [28] An IWD-based feature selection method for intrusion detection system
    Neha Acharya
    Shailendra Singh
    Soft Computing, 2018, 22 : 4407 - 4416
  • [29] A Hybrid-based Feature Selection Method for Intrusion Detection System
    Sun, Xibin
    Ye, Heping
    Liu, Xiaolin
    International Journal of Network Security, 2023, 25 (01) : 131 - 139
  • [30] An IWD-based feature selection method for intrusion detection system
    Acharya, Neha
    Singh, Shailendra
    SOFT COMPUTING, 2018, 22 (13) : 4407 - 4416