POSEIDON: a 2-tier anomaly-based network intrusion detection system

被引:44
|
作者
Bolzoni, Damiano [1 ]
Etalle, Sandro [1 ]
Hartel, Pieter [1 ]
Zambon, Emmanuele [2 ]
机构
[1] Univ Twente, Distributed & Embedded Syst Grp, POB 2100, NL-7500 AEY Enschede, Netherlands
[2] Univ Foscari Venezia, Dipartimento Informat, I-30172 Venice, Italy
关键词
D O I
10.1109/IWIA.2006.18
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We present POSEIDON, a new anomaly-based network intrusion detection system. POSEIDON is payload-based, and has a two-tier architecture: the first stage consists of a Self-Organizing Map, while the second one is a modified PAYL system. Our benchmarks on the 1999 DARPA data set show a higher detection rate and lower number of false positives than PAYL and PHAD.
引用
收藏
页码:144 / +
页数:3
相关论文
共 50 条
  • [31] An Anomaly-based Intrusion Detection System Using Butterfly Optimization Algorithm
    Mahboob, Amir Soltany
    Moghaddam, Mohammad Reza Ostadi
    [J]. 2020 6TH IRANIAN CONFERENCE ON SIGNAL PROCESSING AND INTELLIGENT SYSTEMS (ICSPIS), 2020,
  • [32] Undermining an anomaly-based intrusion detection system using common exploits
    Tan, KMC
    Killourhy, KS
    Maxion, RA
    [J]. RECENT ADVANCES IN INTRUSION DETECTION, PROCEEDINGS, 2002, 2516 : 54 - 73
  • [33] Panacea: Automating Attack Classification for Anomaly-Based Network Intrusion Detection Systems
    Bolzoni, Damiano
    Etalle, Sandro
    Hartel, Pieter H.
    [J]. RECENT ADVANCES IN INTRUSION DETECTION, PROCEEDINGS, 2009, 5758 : 1 - 20
  • [34] Anomaly-based Network Intrusion Detection using Ensemble Machine Learning Approach
    Das, Abhijit
    Pramod
    Sunitha, B. S.
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2022, 13 (02) : 635 - 645
  • [35] Building Multiclass Classification Baselines for Anomaly-based Network Intrusion Detection Systems
    Shah, Ajay
    Clachar, Sophine
    Minimair, Manfred
    Cook, Davis
    [J]. 2020 IEEE 7TH INTERNATIONAL CONFERENCE ON DATA SCIENCE AND ADVANCED ANALYTICS (DSAA 2020), 2020, : 759 - 760
  • [36] Constant False Alarm Rate Anomaly-Based Approach for Network Intrusion Detection
    AlShaalan, Rayan
    AsSadhan, Basil
    Al-Muhtadi, Jalal
    Bin-Abbas, Hesham
    Abd El-Samie, Fathi
    Alshebeili, Saleh
    [J]. 2013 10TH INTERNATIONAL CONFERENCE ON HIGH CAPACITY OPTICAL NETWORKS AND ENABLING TECHNOLOGIES (HONET-CNS), 2013, : 141 - 145
  • [37] A systematic literature review of methods and datasets for anomaly-based network intrusion detection
    Yang, Zhen
    Liu, Xiaodong
    Li, Tong
    Wu, Di
    Wang, Jinjiang
    Zhao, Yunwei
    Han, Han
    [J]. COMPUTERS & SECURITY, 2022, 116
  • [38] Anomaly-based Network Intrusion Detection Model using Deep Learning in Airports
    Sczari, Behrooz
    Moller, Dietmar P. F.
    Deutschmann, Andreas
    [J]. 2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE), 2018, : 1725 - 1729
  • [39] Game Theoretical Method for Anomaly-Based Intrusion Detection
    Wang, Zhiyong
    Xu, Shengwei
    Xu, Guoai
    Yin, Yongfeng
    Zhang, Miao
    Sun, Dawei
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2020, 2020
  • [40] Anomaly-based intrusion detection using Bayesian networks
    Tylman, Wojciech
    [J]. DEPCOS - RELCOMEX 2008: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON DEPENDABILITY OF COMPUTER SYSTEMS, 2008, : 211 - +