Intrusion detection based on behavior mining and machine learning techniques

被引:0
|
作者
Mukkamala, Srinivas [1 ]
Xu, Dennis
Sung, Andrew H.
机构
[1] New Mexico Inst Min & Technol, Dept Comp Sci, Socorro, NM 87801 USA
[2] Inst Complex Addit Syst & Anal, Socorro, NM 87801 USA
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper describes results concerning the classification capability of unsupervised and supervised machine learning techniques in detecting intrusions using network audit trails. In this paper we investigate well known machine learning techniques: Frequent Pattern Tree mining (FP-tree), classification and regression tress (CART), multivariate regression splines (MARS) and TreeNet. The best model is chosen based on the classification accuracy (ROC curve analysis). The results show that high classification accuracies can be achieved in a fraction of the time required by well known support vector machines and artificial neural networks. TreeNet performs the best for normal, probe and denial of service attacks (DoS). CART performs the best for user to super user (U2su) and remote to local (R2L).
引用
收藏
页码:619 / 628
页数:10
相关论文
共 50 条
  • [21] An Overview of Intrusion Detection Based on Data Mining Techniques
    Wankhade, Kapil
    Patka, Sadia
    Thool, Ravinrda
    [J]. 2013 INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORK TECHNOLOGIES (CSNT 2013), 2013, : 626 - 629
  • [22] Machine Learning based Network Intrusion Detection with Hybrid Frequent Item Set Mining
    Firat, Murat
    Bakal, Gokhan
    Akbas, Ayhan
    [J]. JOURNAL OF POLYTECHNIC-POLITEKNIK DERGISI, 2024,
  • [23] A survey of intrusion detection from the perspective of intrusion datasets and machine learning techniques
    Singh G.
    Khare N.
    [J]. International Journal of Computers and Applications, 2022, 44 (07) : 659 - 669
  • [24] Intrusion detection based on phishing detection with machine learning
    Jayaraj R.
    Pushpalatha A.
    Sangeetha K.
    Kamaleshwar T.
    Udhaya Shree S.
    Damodaran D.
    [J]. Measurement: Sensors, 2024, 31
  • [25] Intrusion detection method based on machine learning
    Tian, Xin-Guang
    Gao, Li-Zhi
    Zhang, Er-Yang
    [J]. Tongxin Xuebao/Journal on Communications, 2006, 27 (06): : 108 - 114
  • [26] Machine Learning Based Network Intrusion Detection
    Lee, Chie-Hong
    Su, Yann-Yean
    Lin, Yu-Chun
    Lee, Shie-Jue
    [J]. 2017 2ND IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND APPLICATIONS (ICCIA), 2017, : 79 - 83
  • [27] Intrusion detection system based on machine learning
    Wang, Xu-Ren
    Xu, Rong-Sheng
    [J]. Jisuanji Gongcheng/Computer Engineering, 2006, 32 (14): : 107 - 108
  • [28] A Comparative Analysis of Machine Learning Techniques for IoT Intrusion Detection
    Vitorino, Joao
    Andrade, Rui
    Praca, Isabel
    Sousa, Orlando
    Maia, Eva
    [J]. FOUNDATIONS AND PRACTICE OF SECURITY, FPS 2021, 2022, 13291 : 191 - 207
  • [29] Security intrusion detection using quantum machine learning techniques
    Maxim Kalinin
    Vasiliy Krundyshev
    [J]. Journal of Computer Virology and Hacking Techniques, 2023, 19 : 125 - 136
  • [30] Security intrusion detection using quantum machine learning techniques
    Kalinin, Maxim
    Krundyshev, Vasiliy
    [J]. JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2023, 19 (01) : 125 - 136