Distributed Intrusion Detection Based on Outlier Mining

被引:0
|
作者
Da, Wei [1 ]
Ting, Han Shao [1 ]
机构
[1] Beijing Univ Chem Technol, Beijing 100029, Peoples R China
关键词
Intrusion Detection System; outlier mining;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the rapid development of Internet and network technologies, intrusion detection system (IDS) is expected to be more intelligent. Generally, IDS in current use can rarely meet actual requirements in performance, accuracy and distributed characteristics. In this paper, we present a distributed network intrusion detection system, in which an improved outlier mining method on clustering is introduced. Experimental results prove that both traditional attacks like SYN flooding, and distributed attacks such as DDoS, can be detected effectively with visible accuracy rate and reliability.
引用
收藏
页码:343 / 348
页数:6
相关论文
共 50 条
  • [1] A Network Intrusion Detection Algorithm Based on Outlier Mining
    Ding, Tianyi
    Zhang, Min
    He, Dongjie
    [J]. COMMUNICATIONS, SIGNAL PROCESSING, AND SYSTEMS, 2019, 463 : 1229 - 1236
  • [2] Research of Outlier Mining Based Adaptive Intrusion Detection Techniques
    Ke, Fang Yu
    Yan, Fu
    Lin, Zhou Jun
    [J]. THIRD INTERNATIONAL CONFERENCE ON KNOWLEDGE DISCOVERY AND DATA MINING: WKDD 2010, PROCEEDINGS, 2010, : 552 - 555
  • [3] Density Based Outlier Mining Algorithm with Application to Intrusion Detection
    Yang, Peng
    Huang, Biao
    [J]. PACIIA: 2008 PACIFIC-ASIA WORKSHOP ON COMPUTATIONAL INTELLIGENCE AND INDUSTRIAL APPLICATION, VOLS 1-3, PROCEEDINGS, 2008, : 489 - 492
  • [4] Framework of intrusion detection based on distributed data mining approach
    Lu, Yong
    Cao, Yang
    Ling, Jun
    Li, Li
    [J]. Wuhan Daxue Xuebao (Lixue Ban)/Journal of Wuhan University (Natural Science Edition), 2002, 48 (01):
  • [5] An Intrusion Detection Method Based on Outlier Ensemble Detection
    Huang, Bin
    Li, Wen-fang
    Chen, De-li
    Shi, Liang
    [J]. NSWCTC 2009: INTERNATIONAL CONFERENCE ON NETWORKS SECURITY, WIRELESS COMMUNICATIONS AND TRUSTED COMPUTING, VOL 2, PROCEEDINGS, 2009, : 600 - +
  • [6] A Deviation Based Outlier Intrusion Detection System
    Pareek, Vikas
    Mishra, Aditi
    Sharma, Arpana
    Chauhan, Rashmi
    Bansal, Shruti
    [J]. RECENT TRENDS IN NETWORK SECURITY AND APPLICATIONS, 2010, 89 : 395 - 401
  • [7] Anomaly Based Network Intrusion Detection with Unsupervised Outlier Detection
    Zhang, Jiong
    Zulkernine, Mohammad
    [J]. 2006 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-12, 2006, : 2388 - 2393
  • [8] Clustering Algorithm Based on Outlier Detection for Anomaly Intrusion Detection
    Yin, Shang-Nan
    Kang, Ho-Seok
    Kim, Sung-Ryul
    [J]. JOURNAL OF INTERNET TECHNOLOGY, 2016, 17 (02): : 291 - 299
  • [9] The Design and Implementation of a Distributed Network Intrusion Detection System Based on Data Mining
    Fu, Desheng
    Zhou, Shu
    Guo, Ping
    [J]. 2009 WRI WORLD CONGRESS ON SOFTWARE ENGINEERING, VOL 3, PROCEEDINGS, 2009, : 446 - 450
  • [10] Soft-Man and Data Mining based Distributed Intrusion Detection System
    Zheng, Jun
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (08): : 145 - 150