An effective network intrusion detection based on truncated mean LDA

被引:0
|
作者
Elkhadir, Zyad [1 ]
Chougdali, Khalid [2 ]
Benattou, Mohammed [1 ]
机构
[1] Ibn Tofail Univ, LASTID Res Lab, Kenitra, Morocco
[2] Ibn Tofail Univ, Natl Sch Appl Sci ENSA, GEST Res Grp, Kenitra, Morocco
关键词
LDA; truncated mean; Network Anomaly Detection; NSL-KDD; KDDcup99; FACE RECOGNITION;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The network traffic data employed to build an intrusion detection system (IDS) is always large with ineffective information, that what decrease it efficiency. To deal with this issue, we need to remove the worthless information from the original high dimensional data by using a feature extraction method. The most famous technique which fulfills this role is Linear Discriminant Analysis. However, this method has an important limitation. The class mean vector employed in this method is always estimated by the class sample average. That is not enough to approximate the class mean, specially with the presence of outliers. In this paper, we suggest to use the truncated mean to estimate the class mean vector in LDA modeling. Many experiments on KDDcup99and NSL-KDD indicate the superiority of the proposed technique.
引用
收藏
页数:5
相关论文
共 50 条
  • [21] CLUSTERING-BASED NETWORK INTRUSION DETECTION
    Zhong, Shi
    Khoshgoftaar, Taghi M.
    Seliya, Naeem
    INTERNATIONAL JOURNAL OF RELIABILITY QUALITY AND SAFETY ENGINEERING, 2007, 14 (02) : 169 - 187
  • [22] Research On Intrusion Detection Based On Campus Network
    Wang, Baoyi
    Li, Feng
    Zhang, Shaomin
    2009 THIRD INTERNATIONAL SYMPOSIUM ON INTELLIGENT INFORMATION TECHNOLOGY APPLICATION, VOL 1, PROCEEDINGS, 2009, : 468 - 471
  • [23] An Intrusion Detection System Based On Neural Network
    Can, Okan
    Sahingoz, Ozgur Koray
    2015 23RD SIGNAL PROCESSING AND COMMUNICATIONS APPLICATIONS CONFERENCE (SIU), 2015, : 2302 - 2305
  • [24] P-DNN: An Effective Intrusion Detection Method based on Pruning Deep Neural Network
    Lei, Mingjian
    Li, Xiaoyong
    Cai, Binsi
    Li, Yunfeng
    Liu, Limengwei
    Kong, Wenping
    2020 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS (IJCNN), 2020,
  • [25] A Cloud Based Network Intrusion Detection System
    You, Li
    Wang, Zhanyong
    TEHNICKI VJESNIK-TECHNICAL GAZETTE, 2022, 29 (03): : 987 - 992
  • [26] Network intrusion detection based on BiSRU and CNN
    Ding, Shanshuo
    Wang, Yingxin
    Kou, Liang
    2021 IEEE 18TH INTERNATIONAL CONFERENCE ON MOBILE AD HOC AND SMART SYSTEMS (MASS 2021), 2021, : 145 - 147
  • [27] Network based intrusion detection: A review of technologies
    Richards, K
    COMPUTERS & SECURITY, 1999, 18 (08) : 671 - 682
  • [28] A consensus based network intrusion detection system
    Toulouse, Michel
    Bui Quang Minh
    Curtis, Philip
    2015 5TH INTERNATIONAL CONFERENCE ON IT CONVERGENCE AND SECURITY (ICITCS), 2015,
  • [29] Intrusion detection methods based on network processor
    Wei, Lihua
    Zhang, Xiaoming
    Tang, Yuhua
    Sun, Zhigang
    Jisuanji Gongcheng/Computer Engineering, 2006, 32 (07): : 160 - 162
  • [30] Study on network intrusion detection based on TSVM
    School of Information Security Engineering, Shanghai Jiaotong University, Shanghai 200240, China
    Jisuanji Gongcheng, 2006, 18 (138-140):