UTTAMA: An Intrusion Detection System Based on Feature Clustering and Feature Transformation

被引:0
|
作者
Arun Nagaraja
B. Uma
Rajesh kumar Gunupudi
机构
[1] Jain University,Department of Information Science and Engineering
[2] Malnad College of Engineering,Department of Information Science and Engineering
[3] VNR Vignana Jyothi Institute of Engineering and Technology,Department of Information Technology
来源
Foundations of Science | 2020年 / 25卷
关键词
Anomaly; Intrusion; Classifier; Outlier; Clustering; Dimensionality; Feature extraction;
D O I
暂无
中图分类号
学科分类号
摘要
Detecting Intrusions and anomalies is becoming much more challenging with new attacks popping out over a period of time. Achieving better accuracies by applying benchmark classifier algorithms used for identifying intrusions and anomalies have several hidden data mining challenges. Although neglected by many research findings, one of the most important and biggest challenges is the similarity or membership computation. Another challenge that cannot be simply neglected is the number of features that attributes to dimensionality. This research aims to come up with a new membership function to carry similarity computation that can be helpful for addressing feature dimensionality issues. In principle, this work is aimed at introducing a novel membership function that can help to achieve better classification accuracies and eventually lead to better intrusion and anomaly detection. Experiments are performed on KDD dataset with 41 attributes and also KDD dataset with 19 attributes. Recent approaches CANN and CLAPP have showed new approaches for intrusion detection. The proposed classifier is named as UTTAMA. UTTAMA performed better to both CANN and CLAPP approaches w.r.t overall classifier accuracy. Another promising outcome achieved using UTTAMA is the U2R and R2L attack accuracies. The importance of proposed approach is that the accuracy achieved using proposed approach outperforms CLAPP, CANN, SVM, KNN and other existing classifiers.
引用
收藏
页码:1049 / 1075
页数:26
相关论文
共 50 条
  • [41] Feature Construction Scheme for Efficient Intrusion Detection System
    Kim, Eunhye
    Lee, Seungmin
    Kwon, Kihoon
    Kim, Sehun
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2010, 26 (02) : 527 - 547
  • [42] A Hybrid Feature Reduced Approach for Intrusion Detection System
    Garg, Lavisha
    Akashdeep
    Aggarwal, Naveen
    COMPUTING AND NETWORK SUSTAINABILITY, 2019, 75
  • [43] An Effective Feature Extraction Mechanism for Intrusion Detection System
    Kuo, Cheng-Chung
    Tseng, Ding-Kai
    Tsai, Chun-Wei
    Yang, Chu-Sing
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2021, E104D (11) : 1814 - 1827
  • [44] An Intrusion Detection System Using Unsupervised Feature Selection
    Suman, Chanchal
    Tripathy, Somanath
    Saha, Sriparna
    PROCEEDINGS OF THE 2019 IEEE REGION 10 CONFERENCE (TENCON 2019): TECHNOLOGY, KNOWLEDGE, AND SOCIETY, 2019, : 19 - 24
  • [45] An efficient feature reduction technique for intrusion detection system
    Singh, Shailendra
    Silakari, Sanjay
    Patel, Ravindra
    PROCEEDINGS OF 2009 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND COMPUTING (IACSIT ICMLC 2009), 2009, : 147 - 153
  • [46] A feature selection approach to find optimal feature subsets for the network intrusion detection system
    Seung-Ho Kang
    Kuinam J. Kim
    Cluster Computing, 2016, 19 : 325 - 333
  • [47] Intrusion Detection Based on Parallel Intelligent Optimization Feature Extraction and Distributed Fuzzy Clustering in WSNs
    Liu, Zhouzhou
    Wei, Wei
    Wang, Hao
    Zhang, Yangmei
    Zhang, Qianyun
    Li, Shining
    IEEE ACCESS, 2018, 6 : 72201 - 72211
  • [48] Network Intrusion Detection by Variational Component-Based Feature Saliency Gaussian Mixture Clustering
    Hong, Xin
    Papazachos, Zafeirios
    del Rincon, Jesus Martinez
    Miller, Paul
    COMPUTER SECURITY. ESORICS 2023 INTERNATIONAL WORKSHOPS, CPS4CIP, PT II, 2024, 14399 : 761 - 772
  • [49] A feature selection approach to find optimal feature subsets for the network intrusion detection system
    Kang, Seung-Ho
    Kim, Kuinam J.
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2016, 19 (01): : 325 - 333
  • [50] Building an efficient intrusion detection system based on feature selection and ensemble classifier
    Zhou, Yuyang
    Cheng, Guang
    Jiang, Shanqing
    Dai, Mian
    COMPUTER NETWORKS, 2020, 174