Hyper clustering model for dynamic network intrusion detection
نویسندگان
چکیده
Generally, the existing Intrusion Detection Systems (IDS) solutions suffer from low detection accuracy for some attack types compared with overall of attacks. The data imbalance technically affects ratio frequent attacks class (e.g. zero-day attack) to more instances. Therefore, IDS-based machine learning algorithms potentially high false-positive rates. To overcome limitation solutions, a hyper-clustering model is proposed dynamic intrusion based on Density-Based Spatial Clustering Applications Noise (DBSCAN) and cosine similarity. solution develops standard DBSCAN by adding new evolving process distance measures between clusters dataset. Moreover, classifier similarity predict labelling abnormal behaviour. experimental results show that outperformed original DBCAN related works. mean silhouette achieves score 0.87 other solutions. Furthermore, reduces square error 0.66 0.13 86.82%, 79.10% 90.03% in general KDDTest+, KDDTest-21 NSL-KDD UNSW-NB15 benchmark datasets, respectively.
منابع مشابه
Clustering-based Network Intrusion Detection
Recently data mining methods have gained importance in addressing network security issues, including network intrusion detection—a challenging task in network security. Intrusion detection systems aim to identify attacks with a high detection rate and a low false alarm rate. Classification-based data mining models for intrusion detection are often ineffective in dealing with dynamic changes in ...
متن کاملEnhancing Network Intrusion Detection through Host Clustering
The state-of-the-art in intrusion detection mainly relies on signature-based techniques. Although signature-based detection is an efficient way of protecting against known threats, it will not protect against new, advanced intrusions such as Advanced Persistent Threats (APTs). Moreover, many intrusion detection systems only monitor the network traffic crossing the external border of a network, ...
متن کاملNetwork Intrusion Detection Using Genetic Clustering
We apply the Unsupervised Niche Clustering (UNC), a genetic niching technique for robust and unsupervised clustering, to the intrusion detection problem. Using the normal samples, UNC generates clusters sumarizing the normal space. These clusters can be characterized by fuzzy membership functions, that are later aggregated to determine a level of normality. Anomalies are identified by their low...
متن کاملProposing A Distributed Model For Intrusion Detection In Mobile Ad-Hoc Network Using Neural Fuzzy Interface
Security term in mobile ad hoc networks has several aspects because of the special specification of these networks. In this paper a distributed architecture was proposed in which each node performed intrusion detection based on its own and its neighbors’ data. Fuzzy-neural interface was used that is the composition of learning ability of neural network and fuzzy Ratiocination of fuzzy system as...
متن کاملProposing A Distributed Model For Intrusion Detection In Mobile Ad-Hoc Network Using Neural Fuzzy Interface
Security term in mobile ad hoc networks has several aspects because of the special specification of these networks. In this paper a distributed architecture was proposed in which each node performed intrusion detection based on its own and its neighbors’ data. Fuzzy-neural interface was used that is the composition of learning ability of neural network and fuzzy Ratiocination of fuzzy system as...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Iet Communications
سال: 2022
ISSN: ['1751-8636', '1751-8628']
DOI: https://doi.org/10.1049/cmu2.12523