A Clustering based Algorithm for Network Intrusion Detection

被引:0
|
作者
Arya, K. V. [1 ]
Kumar, Hemant [1 ]
机构
[1] ABV Indian Inst Informat Technol & Management, Gwalior, India
关键词
Cluster; Seeded k-means; Snort; Hybrid;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The secure information transmission is very important in the present scenario. Many intrusion detection system (IDS) have been developed in recent past which are based on either signature information or anomaly information. But all these systems do generate a lot of false detections. In this work a hybrid IDS is being proposed which uses the signature and anomaly information together. The proposed algorithm first explore those traffic features which are changing during an intrusion activity and then based on a predefined threshold value the most prominent features related to attack are identified. Thereafter, these features are included in snort rule set to detect the anomalous traffic. This anomaly detection process is combined with existing signature of snort to produce the better detection. The proposed detection algorithm has been implemented on KDDcup99 dataset. It is observed through experimental results that the proposed algorithm efficiently detect the intrusion activity in the given network.
引用
收藏
页码:193 / 196
页数:4
相关论文
共 50 条
  • [41] Clustering Detection Method of Network Intrusion Feature Based on Support Vector Machine and LCA Block Algorithm
    Jie Zhang
    Jinguang Sun
    Hua He
    [J]. Wireless Personal Communications, 2022, 127 : 599 - 613
  • [42] Clustering Detection Method of Network Intrusion Feature Based on Support Vector Machine and LCA Block Algorithm
    Zhang, Jie
    Sun, Jinguang
    He, Hua
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2022, 127 (01) : 599 - 613
  • [43] Anomaly detection based on unsupervised niche clustering with application to network intrusion detection
    Leon, E
    Nasraoui, F
    Gomez, J
    [J]. CEC2004: PROCEEDINGS OF THE 2004 CONGRESS ON EVOLUTIONARY COMPUTATION, VOLS 1 AND 2, 2004, : 502 - 508
  • [44] A supervised clustering algorithm for computer intrusion detection
    Xiangyang Li
    Nong Ye
    [J]. Knowledge and Information Systems, 2005, 8 : 498 - 509
  • [45] Application of improved Clustering Algorithm in Intrusion Detection
    Dai Kunyu
    Hu Bin
    [J]. 2ND INTERNATIONAL SYMPOSIUM ON COMPUTER NETWORK AND MULTIMEDIA TECHNOLOGY (CNMT 2010), VOLS 1 AND 2, 2010, : 621 - 624
  • [46] A supervised clustering algorithm for computer intrusion detection
    Li, XY
    Ye, N
    [J]. KNOWLEDGE AND INFORMATION SYSTEMS, 2005, 8 (04) : 498 - 509
  • [47] A neighbor propagation clustering algorithm for intrusion detection
    Li, Zheng
    [J]. Li, Zheng (lizh_1981@163.com), 1600, International Information and Engineering Technology Association (34): : 331 - 336
  • [48] Fuzzy clustering method based on genetic algorithm in intrusion detection study
    Huang, Min-Ming
    Lin, Bo-Gang
    [J]. Tongxin Xuebao/Journal on Communications, 2009, 30 (11 A): : 140 - 145
  • [49] A novel intrusion detection method based on clonal selection clustering algorithm
    Xian, JQ
    Lang, FH
    Tang, XL
    [J]. PROCEEDINGS OF 2005 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-9, 2005, : 3905 - 3910
  • [50] CID: a novel clustering-based database intrusion detection algorithm
    Keyvanpour, Mohamad Reza
    Barani Shirzad, Mehrnoush
    Mehmandoost, Samaneh
    [J]. JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2021, 12 (02) : 1601 - 1612