A Clustering based Algorithm for Network Intrusion Detection

被引:0
|
作者
Arya, K. V. [1 ]
Kumar, Hemant [1 ]
机构
[1] ABV Indian Inst Informat Technol & Management, Gwalior, India
关键词
Cluster; Seeded k-means; Snort; Hybrid;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The secure information transmission is very important in the present scenario. Many intrusion detection system (IDS) have been developed in recent past which are based on either signature information or anomaly information. But all these systems do generate a lot of false detections. In this work a hybrid IDS is being proposed which uses the signature and anomaly information together. The proposed algorithm first explore those traffic features which are changing during an intrusion activity and then based on a predefined threshold value the most prominent features related to attack are identified. Thereafter, these features are included in snort rule set to detect the anomalous traffic. This anomaly detection process is combined with existing signature of snort to produce the better detection. The proposed detection algorithm has been implemented on KDDcup99 dataset. It is observed through experimental results that the proposed algorithm efficiently detect the intrusion activity in the given network.
引用
收藏
页码:193 / 196
页数:4
相关论文
共 50 条
  • [1] Relative network entropy based clustering algorithm for intrusion detection
    Qian, Quan
    Wang, Tianhong
    Zhan, Rui
    [J]. International Journal of Network Security, 2013, 15 (01) : 16 - 22
  • [2] Intrusion detection based on clustering genetic algorithm
    Zhao, JL
    Zhao, JF
    Li, JJ
    [J]. Proceedings of 2005 International Conference on Machine Learning and Cybernetics, Vols 1-9, 2005, : 3911 - 3914
  • [3] An intrusion detection algorithm for sensor network based on normalized cut spectral clustering
    Yang, Gaoming
    Yu, Xu
    Xu, Lingwei
    Xin, Yu
    Fang, Xianjin
    [J]. PLOS ONE, 2019, 14 (10):
  • [4] Design of network intrusion detection system based on parallel DPC clustering algorithm
    Wang, Jing
    Han, Dezhi
    [J]. INTERNATIONAL JOURNAL OF EMBEDDED SYSTEMS, 2020, 13 (03) : 318 - 327
  • [5] CLUSTERING-BASED NETWORK INTRUSION DETECTION
    Zhong, Shi
    Khoshgoftaar, Taghi M.
    Seliya, Naeem
    [J]. INTERNATIONAL JOURNAL OF RELIABILITY QUALITY AND SAFETY ENGINEERING, 2007, 14 (02) : 169 - 187
  • [6] A clustering algorithm for intrusion detection
    Wang, Q
    Megalooikonomou, V
    [J]. DATA MINING, INTRUSION DETECTION, INFORMATION ASSURANCE, AND DATA NETWORKS SECURITY 2005, 2005, 5812 : 31 - 38
  • [7] Application of Support Vector Clustering algorithm to network intrusion detection
    Xu, BG
    Zhang, A
    [J]. PROCEEDINGS OF THE 2005 INTERNATIONAL CONFERENCE ON NEURAL NETWORKS AND BRAIN, VOLS 1-3, 2005, : 1036 - 1040
  • [8] A semi-supervised clustering algorithm for network intrusion detection
    Wei, Xiao-Tao
    Huang, Hou-Kuan
    Tian, Sheng-Feng
    [J]. Tiedao Xuebao/Journal of the China Railway Society, 2010, 32 (01): : 49 - 53
  • [9] Applying an Improved DBSCAN Clustering Algorithm to Network Intrusion Detection
    Yao, Shunyu
    Xu, Hui
    Yan, Lingyu
    Su, Jun
    [J]. PROCEEDINGS OF THE 11TH IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT DATA ACQUISITION AND ADVANCED COMPUTING SYSTEMS: TECHNOLOGY AND APPLICATIONS (IDAACS'2021), VOL 2, 2021, : 865 - 868
  • [10] Clustering Algorithm Based on Outlier Detection for Anomaly Intrusion Detection
    Yin, Shang-Nan
    Kang, Ho-Seok
    Kim, Sung-Ryul
    [J]. JOURNAL OF INTERNET TECHNOLOGY, 2016, 17 (02): : 291 - 299