POSEIDON: a 2-tier anomaly-based network intrusion detection system

被引:44
|
作者
Bolzoni, Damiano [1 ]
Etalle, Sandro [1 ]
Hartel, Pieter [1 ]
Zambon, Emmanuele [2 ]
机构
[1] Univ Twente, Distributed & Embedded Syst Grp, POB 2100, NL-7500 AEY Enschede, Netherlands
[2] Univ Foscari Venezia, Dipartimento Informat, I-30172 Venice, Italy
关键词
D O I
10.1109/IWIA.2006.18
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We present POSEIDON, a new anomaly-based network intrusion detection system. POSEIDON is payload-based, and has a two-tier architecture: the first stage consists of a Self-Organizing Map, while the second one is a modified PAYL system. Our benchmarks on the 1999 DARPA data set show a higher detection rate and lower number of false positives than PAYL and PHAD.
引用
收藏
页码:144 / +
页数:3
相关论文
共 50 条
  • [41] Anomaly-Based Network Intrusion Detection System through Feature Selection and Hybrid Machine Learning Technique
    Pattawaro, Apichit
    Polprasert, Chantri
    [J]. 2018 16TH INTERNATIONAL CONFERENCE ON ICT AND KNOWLEDGE ENGINEERING (ICT&KE), 2018, : 64 - 69
  • [42] Anomaly-Based Intrusion Detection Algorithms for Wireless Networks
    Fragkiadakis, Alexandros G.
    Siris, Vasilios A.
    Petroulakis, Nikolaos
    [J]. WIRED-WIRELESS INTERNET COMMUNICATIONS, PROCEEDINGS, 2010, 6074 : 192 - 203
  • [43] Feature Selection for Effective Anomaly-Based Intrusion Detection
    Ghali, Noreen I.
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2009, 9 (03): : 285 - 289
  • [44] An anomaly-based intrusion detection system in presence of benign outliers with visualization capabilities
    Karami, Amin
    [J]. EXPERT SYSTEMS WITH APPLICATIONS, 2018, 108 : 36 - 60
  • [45] Accuracy improvement of anomaly-based intrusion detection system using Taguchi method
    Konno, T
    Tateoka, M
    [J]. 2005 SYMPOSIUM ON APPLICATIONS AND THE INTERNET WORKSHOPS, PROCEEDINGS, 2005, : 90 - 93
  • [46] DESIGN AND IMPLEMENTATION OF AN ANOMALY-BASED INTRUSION DETECTION SYSTEM FOR WIRELESS INDUSTRIAL NETWORKS
    Wei, Min
    Kim, Keecheon
    Wang, Ping
    [J]. FIFTH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER THEORY AND ENGINEERING (ICACTE 2012), 2012, : 879 - 886
  • [47] Incremental Anomaly-based Intrusion Detection System Using Limited Labeled Data
    Alaei, Parisa
    Noorbehbahani, Fakhroddin
    [J]. 2017 3RD INTERNATIONAL CONFERENCE ON WEB RESEARCH (ICWR), 2017, : 178 - 184
  • [48] An Anomaly-Based Intrusion Detection System for IoT Networks Using Trust Factor
    Singh K.P.
    Kesswani N.
    [J]. SN Computer Science, 2022, 3 (2)
  • [49] A New Anomaly-Based Intrusion Detection System for MIL-STD-1553
    Ciloglu, Yunus Emre
    Bahtiyar, Serif
    [J]. 2023 10TH INTERNATIONAL CONFERENCE ON RECENT ADVANCES IN AIR AND SPACE TECHNOLOGIES, RAST, 2023,
  • [50] Adaptive anomaly-based intrusion detection system using genetic algorithm and profiling
    Alves Resende, Paulo Angelo
    Drummond, Andre Costa
    [J]. SECURITY AND PRIVACY, 2018, 1 (04):