Developing Data Mining Techniques for Intruder Detection in Network Traffic

被引:3
|
作者
Agrawal, Amar [1 ]
Mohammed, Sabah [1 ]
Fiaidhi, Jinan [1 ]
机构
[1] Lakehead Univ, Dept Comp Sci, Thunder Bay, ON, Canada
关键词
Intrusion Detection System; Data Mining; Hybrid IDS;
D O I
10.14257/ijsia.2016.10.8.29
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper we have proposed a hybrid intrusion detection system consisting of a misuse detection model based upon a Binary Tree of Classifiers as the first stage and an anomaly detection model based upon SVM Classifier as the second stage. The Binary Tree consists of several best known classifiers specialized in detecting specific attacks at a high level of accuracy. Combination of a Binary Tree and specialized classifiers will increase accuracy of the misuse detection model. The misuse detection model will detect only known attacks. In-order to detect unknown attacks, we have an anomaly detection model as the second stage. SVM has been used, since it's the best known classifier for anomaly detection which will detect patterns that deviate from normal behavior. The proposed hybrid intrusion detection has been tested and evaluated using KDD Cup '99, NSL-KDD and UNSW-NB15 dataset.
引用
收藏
页码:335 / 342
页数:8
相关论文
共 50 条
  • [21] Data mining-based integrated network traffic visualization framework for threat detection
    Bhardwaj, Amit Kumar
    Singh, Maninder
    [J]. NEURAL COMPUTING & APPLICATIONS, 2015, 26 (01): : 117 - 130
  • [22] An in-depth analysis on traffic flooding attacks detection and system using data mining techniques
    Yu, Jaehak
    Kang, Hyunjoong
    Park, DaeHeon
    Bang, Hyo-Chan
    Kang, Do Wook
    [J]. JOURNAL OF SYSTEMS ARCHITECTURE, 2013, 59 (10) : 1005 - 1012
  • [23] Promising Techniques for Anomaly Detection on Network Traffic
    Tian, Hui
    Liu, Jingtian
    Ding, Meimei
    [J]. COMPUTER SCIENCE AND INFORMATION SYSTEMS, 2017, 14 (03) : 597 - 609
  • [24] Data mining based wireless network traffic forecasting
    Stolojescu-Crisan, Cristina
    [J]. 2012 10TH INTERNATIONAL SYMPOSIUM ON ELECTRONICS AND TELECOMMUNICATIONS, 2012, : 115 - 118
  • [25] Sequential Data Mining of Network Traffic in URL Logs
    Korytkowski, Marcin
    Nowak, Jakub
    Nowicki, Robert
    Milkowska, Kamila
    Scherer, Magdalena
    Goetzen, Piotr
    [J]. ARTIFICIAL INTELLIGENCEAND SOFT COMPUTING, PT I, 2019, 11508 : 125 - 130
  • [26] Fusion of Multiple Data Mining Techniques for Effective Network Intrusion Detection - A Contemporary Approach
    Chandrashekar, A. M.
    Raghuveer, K.
    [J]. PROCEEDINGS OF THE FIFTH INTERNATIONAL CONFERENCE ON SECURITY OF INFORMATION AND NETWORKS, 2012, : 178 - 182
  • [27] Intrusion detection using data mining techniques
    Reddy, YB
    Guha, R
    [J]. Proceedings of the IASTED International Conference on Artificial Intelligence and Applications, Vols 1and 2, 2004, : 26 - 30
  • [28] Application of Data Mining Techniques in Intrusion Detection
    Li Min
    [J]. CALL OF PAPER PROCEEDINGS OF 2008 INTERNATIONAL CONFERENCE ON MANAGEMENT SCIENCE AND ENGINEERING, 2008, : 1273 - 1277
  • [29] Research on Principle Techniques for Network Intrusion Detection based on Data Mining and Analysis Approach
    Jiang Shan
    Chen Changai
    [J]. PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS RESEARCH AND MECHATRONICS ENGINEERING, 2015, 121 : 513 - 517
  • [30] A Comparison of Data Mining Techniques for Intrusion Detection
    Naidu, R. China Appala
    Avadhani, P. S.
    [J]. 2012 IEEE INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION CONTROL AND COMPUTING TECHNOLOGIES (ICACCCT), 2012, : 41 - 44