An Intelligent Weighted Outlier Detection Method for Intrusion Detection Using Mst and K-nn

نویسندگان

  • R. Selvi
  • A. Suresh
چکیده

Intrusion Detection System (IDS) is a potential part in the area of network security system. An effective intrusion detection system is necessary for providing effective communications in the past world. The major challenging task in this system is the classification of users such as normal user and attacker. For that purpose so many classification algorithms have been proposed in the past to detect and report about user’s behaviour (normal or abnormal) in networks. The sufficient detection accuracy is not yet met due to the lacking of suitable methodology introduction in this field. Outlier detection is the effective process to improve the classification performance. In the past, many outlier detection methods with the combination of different clustering methods have been proposed. These all are have limitations in terms of accuracy and speed. In this paper, we propose a new outlier detection model called Intelligent Weighted MST and k-NN Based Outlier Detection (IWMKOD) to detect the intruders in all kinds of network environment. This model is the combination of the proposed Intelligent MST and kNN based Outlier Detection. [Xiao Chun Wang et al., 2015] and Weighted Distance based Outlier Detection [S. Ganapathy et al., 2011]. The experimental results show that the proposed algorithm improves the detection accuracy and reduces the false alarm rate.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A hybridization of evolutionary fuzzy systems and ant Colony optimization for intrusion detection

A hybrid approach for intrusion detection in computer networks is presented in this paper. The proposed approach combines an evolutionary-based fuzzy system with an Ant Colony Optimization procedure to generate high-quality fuzzy-classification rules. We applied our hybrid learning approach to network security and validated it using the DARPA KDD-Cup99 benchmark data set. The results indicate t...

متن کامل

Outlier Detection in Wireless Sensor Networks Using Distributed Principal Component Analysis

Detecting anomalies is an important challenge for intrusion detection and fault diagnosis in wireless sensor networks (WSNs). To address the problem of outlier detection in wireless sensor networks, in this paper we present a PCA-based centralized approach and a DPCA-based distributed energy-efficient approach for detecting outliers in sensed data in a WSN. The outliers in sensed data can be ca...

متن کامل

Detecting Suspicious Card Transactions in unlabeled data of bank Using Outlier Detection Techniqes

With the advancement of technology, the use of ATM and credit cards are increased. Cyber fraud and theft are the kinds of threat which result in using these Technologies. It is therefore inevitable to use fraud detection algorithms to prevent fraudulent use of bank cards. Credit card fraud can be thought of as a form of identity theft that consists of an unauthorized access to another person's ...

متن کامل

An Intelligent Intrusion Detection System Using Outlier Detection and Multiclass SVM

Intrusion Detection Systems have been used along with various techniques to detect intrusions in networks, distributed databases and web databases. However, all these systems are able to detect the intruders with high false alarm rate. In this paper, we propose a new intrusion detection model using the combination of outlier detection method and multiclass SVM classification. For this purpose, ...

متن کامل

Intelligent Agent-Based Intrusion Detection System Using Enhanced Multiclass SVM

Intrusion detection systems were used in the past along with various techniques to detect intrusions in networks effectively. However, most of these systems are able to detect the intruders only with high false alarm rate. In this paper, we propose a new intelligent agent-based intrusion detection model for mobile ad hoc networks using a combination of attribute selection, outlier detection, an...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015