Anomaly Intrusion Detection System Using Information Theory, K-NN and KMC Algorithms

نویسنده

  • Hossein M. Shirazi
چکیده

The huge expans ion in the s ize of internet and the appearance of various types of malicious attack and the in s u ffic iency of traditional security tools like antivirus conduct to the development of intrus ion detection sys tems or IDS. Since current IDSs a re s ignature based they s til are unable to detect new forms of attacks even if these attacks are s lightly deriv e d from known ones . So, recent researches concentrate on developing new techniques, algorithms and IDSs that use inteligent methods . In this paper some anomaly detection engines have been propo s e d based on K-NN, K-Means Clus tering (KMC) algo rithms. Firs tly, by applying information theory measures , network connection features were ranked according t o t heir importance in detecting attack classes like DOS, R2L, U2R, and PROBE. This ranking s trongly helped in selecting only the mos t important fe a t u re s and by consequent decreasing dramaticaly the computation complexit y and eliminating the noise resultant of irrelevant features . Secondly, some anomaly Intrus ion Detection models approaches were propo s e d depending on features selection, k-NN a n d k-means clus tering. These approaches proved their efficiency, where the detection rate was more than 92% and was better than other approaches especialy in detecting dangerous attacks like R2L and U2R.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Assessment Methodology for Anomaly-Based Intrusion Detection in Cloud Computing

Cloud computing has become an attractive target for attackers as the mainstream technologies in the cloud, such as the virtualization and multitenancy, permit multiple users to utilize the same physical resource, thereby posing the so-called problem of internal facing security. Moreover, the traditional network-based intrusion detection systems (IDSs) are ineffective to be deployed in the cloud...

متن کامل

A hybridization of evolutionary fuzzy systems and ant Colony optimization for intrusion detection

A hybrid approach for intrusion detection in computer networks is presented in this paper. The proposed approach combines an evolutionary-based fuzzy system with an Ant Colony Optimization procedure to generate high-quality fuzzy-classification rules. We applied our hybrid learning approach to network security and validated it using the DARPA KDD-Cup99 benchmark data set. The results indicate t...

متن کامل

STLR: a novel danger theory based structural TLR algorithm

Artificial Immune Systems (AIS) have long been used in the field of computer security and especially in Intrusion Detection systems. Intrusion detection based on AISs falls into two main categories. The first generation of AIS is inspired from adaptive immune reactions but, the second one which is called danger theory focuses on both adaptive and innate reactions to build a more biologically-re...

متن کامل

Anomaly Detection Using SVM as Classifier and Decision Tree for Optimizing Feature Vectors

Abstract- With the advancement and development of computer network technologies, the way for intruders has become smoother; therefore, to detect threats and attacks, the importance of intrusion detection systems (IDS) as one of the key elements of security is increasing. One of the challenges of intrusion detection systems is managing of the large amount of network traffic features. Removing un...

متن کامل

A Hybrid Framework for Building an Efficient Incremental Intrusion Detection System

In this paper, a boosting-based incremental hybrid intrusion detection system is introduced. This system combines incremental misuse detection and incremental anomaly detection. We use boosting ensemble of weak classifiers to implement misuse intrusion detection system. It can identify new classes types of intrusions that do not exist in the training dataset for incremental misuse detection. As...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012