POSEIDON: a 2-tier anomaly-based network intrusion detection system

被引:44
|
作者
Bolzoni, Damiano [1 ]
Etalle, Sandro [1 ]
Hartel, Pieter [1 ]
Zambon, Emmanuele [2 ]
机构
[1] Univ Twente, Distributed & Embedded Syst Grp, POB 2100, NL-7500 AEY Enschede, Netherlands
[2] Univ Foscari Venezia, Dipartimento Informat, I-30172 Venice, Italy
关键词
D O I
10.1109/IWIA.2006.18
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We present POSEIDON, a new anomaly-based network intrusion detection system. POSEIDON is payload-based, and has a two-tier architecture: the first stage consists of a Self-Organizing Map, while the second one is a modified PAYL system. Our benchmarks on the 1999 DARPA data set show a higher detection rate and lower number of false positives than PAYL and PHAD.
引用
收藏
页码:144 / +
页数:3
相关论文
共 50 条
  • [1] Anomaly-Based Network Intrusion Detection System
    Villalba, L. J. G.
    Orozco, A. L. S.
    Vidal, J. M.
    [J]. IEEE LATIN AMERICA TRANSACTIONS, 2015, 13 (03) : 850 - 855
  • [2] ANOMALY-BASED NETWORK INTRUSION DETECTION METHODS
    Nevlud, Pavel
    Bures, Miroslav
    Kapicak, Lukas
    Zdralek, Jaroslav
    [J]. ADVANCES IN ELECTRICAL AND ELECTRONIC ENGINEERING, 2013, 11 (06) : 468 - 474
  • [3] LSTM for Anomaly-Based Network Intrusion Detection
    Althubiti, Sara A.
    Jones, Eric Marcell, Jr.
    Roy, Kaushik
    [J]. 2018 28TH INTERNATIONAL TELECOMMUNICATION NETWORKS AND APPLICATIONS CONFERENCE (ITNAC), 2018, : 293 - 295
  • [4] An anomaly-based Network Intrusion Detection System using Deep learning
    Nguyen Thanh Van
    Tran Ngoc Thinh
    Le Thanh Sach
    [J]. 2017 INTERNATIONAL CONFERENCE ON SYSTEM SCIENCE AND ENGINEERING (ICSSE), 2017, : 210 - 214
  • [5] Anomaly-Based Network Intrusion Detection Using SVM
    Zhang, Yuan
    Yang, Qinghai
    Lambotharan, Sangarapillai
    Kyriakopoulos, Konstantinos
    Ghafir, Ibrahim
    AsSadhan, Basil
    [J]. 2019 11TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS AND SIGNAL PROCESSING (WCSP), 2019,
  • [6] Anomaly-Based Network Intrusion Detection: An Outlier Detection Techniques
    Kumar, Neeraj
    Kumar, Upendra
    [J]. PROCEEDINGS OF THE EIGHTH INTERNATIONAL CONFERENCE ON SOFT COMPUTING AND PATTERN RECOGNITION (SOCPAR 2016), 2018, 614 : 262 - 269
  • [7] SCADA Networks Anomaly-based Intrusion Detection System
    Almehmadi, Abdulaziz
    [J]. 11TH INTERNATIONAL CONFERENCE ON SECURITY OF INFORMATION AND NETWORKS (SIN 2018), 2018,
  • [8] Anomaly-based intrusion detection system for IoT application
    Bhavsar M.
    Roy K.
    Kelly J.
    Olusola O.
    [J]. Discover Internet of Things, 2023, 3 (01):
  • [9] Anomaly-based network intrusion detection: Techniques, systems and challenges
    Garcia-Teodoro, P.
    Diaz-Verdejo, J.
    Macia-Fernandez, G.
    Vazquez, E.
    [J]. COMPUTERS & SECURITY, 2009, 28 (1-2) : 18 - 28
  • [10] A Convolutional Neural Network for Improved Anomaly-Based Network Intrusion Detection
    Al-Turaiki, Isra
    Altwaijry, Najwa
    [J]. BIG DATA, 2021, 9 (03) : 233 - 252