A hierarchical SOM-based intrusion detection system

نویسندگان

  • Hilmi Günes Kayacik
  • A. Nur Zincir-Heywood
  • Malcolm I. Heywood
چکیده

An approach to network intrusion detection is investigated, based purely on a hierarchy of SelfOrganizing Feature Maps. Our principle interest is to establish just how far such an approach can be taken in practice. To do so, the KDD benchmark dataset from the International Knowledge Discovery and Data Mining Tools Competition is employed. Extensive analysis is conducted in order to address the significance of the features employed, the partitioning of training data and the complexity of the architecture. In comparison to results reported previously using unsupervised learning, we demonstrate that best performance is achieved using a two-layer SOM hierarchy, based on all 41-features from the KDD dataset. Moreover, this is achieved whilst utilizing 40% of the original training data. In terms of the contribution of different features, we recommend using ‘Protocol’ as a switching parameter for designing modular solutions to the detection problem, where this observation is also supported by other researchers.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Entropy Based Fuzzy Rule Weighting for Hierarchical Intrusion Detection

Predicting different behaviors in computer networks is the subject of many data mining researches. Providing a balanced Intrusion Detection System (IDS) that directly addresses the trade-off between the ability to detect new attack types and providing low false detection rate is a fundamental challenge. Many of the proposed methods perform well in one of the two aspects, and concentrate on a su...

متن کامل

Using Improved GHSOM for Intrusion Detection

Self-organizing Maps (SOM) have been shown to be successful for intrusion detection. However, the static architecture and the lack of representation of hierarchical relations often results in low detection rates. The Growing Hierarchical SOM (GHSOM) addresses these limitations of SOM. In this paper, in order to obtain higher detection rate and improve the stability of intrusion detection, some ...

متن کامل

An Intrusion Detection Method Based on Improved Growing Hierarchical Self-Organizing Map

Growing hierarchical self-organizing map (GHSOM), as a kind of topology map, is an effective method to process large scale data. It not only enjoys the advantages of self-organizing map (SOM), but also owns its special multi-layer hierarchical structure which is easy to reveal the hierarchical structure behind the input data by using GHSOM. Though GHSOM has made great progress on the improvemen...

متن کامل

An Intrusion Detection System Based on Hierarchical Self-Organization

An intrusion detection system (IDS) monitors the IP packets flowing over the network to capture intrusions or anomalies. One of the techniques used for anomaly detection is building statistical models using metrics derived from observation of the user's actions. A neural network model based on self organization is proposed for detecting intrusions. The selforganizing map (SOM) has shown to be s...

متن کامل

Host-Based Intrusion Detection Using Self-Organizing Maps

Hierarchical SOMs are applied to the problem of host based intrusion detection on computer networks. Unlike systems based on operating system audit trails, the approach operates on real-time data without extensive off-line training and with minimal expert knowledge. Specific recommendations are made regarding the representation of time, network parameters and SOM architecture.

متن کامل

A-GHSOM: Adaptive Growing Hierarchical Self Organizing Map for Network Intrusion Detection

 Anomaly detection and misuse detection are two major types of network intrusion detection systems.  Machine learning approaches have been used for anomaly detection. In particular, approaches based on self-organizing maps (SOMs) of artificial neural networks have shown effectiveness at identifying “unknown” attacks.  Effectiveness of using traditional SOM models is limited by the static nat...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • Eng. Appl. of AI

دوره 20  شماره 

صفحات  -

تاریخ انتشار 2007