Hybrid Approach for Detection of Anomaly Network Traffic using Data Mining Techniques

被引:40
|
作者
Agarwal, Basant [1 ]
Mittal, Namita [1 ]
机构
[1] Malviya Natl Inst Technol Jaipur, Dept Comp Engn, Jaipur 302016, Rajasthan, India
关键词
Anomaly detection; data mining; support vector machine;
D O I
10.1016/j.protcy.2012.10.121
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Anomaly based Intrusion Detection System (IDS) is getting popularity due to its adaptability to the changes in the behavior of network traffic as it has the ability to detect the new attacks. As it is very difficult to set any predefined rule for identifying correctly attack traffic since there is no major difference between normal and attack traffic. In this paper, Anomaly traffic detection system based on the Entropy of network features and Support Vector Machine (SVM) are compared. Further, a hybrid technique that is combination of both entropy of network features and support vector machine is compared with individual methods. DARPA Intrusion Detection Evaluation dataset is used in order to evaluate the methods. It is proved that entropy based detection technique is capable of identifying anomalies in network better than support vector machine based detection system. In addition, hybrid approach outperforms entropy and SVM based techniques. (C) 2012 The Authors. Published by Elsevier Ltd. Selection and/or peer-review under responsibility of the Department of Computer Science & Engineering, National Institute of Technology Rourkela
引用
收藏
页码:996 / 1003
页数:8
相关论文
共 50 条
  • [1] Anomaly Detection Approach using Hybrid Algorithm of Data Mining Technique
    Gadal, Saad Mohamed Ali Mohamed
    Mokhtar, Rania A.
    [J]. 2017 INTERNATIONAL CONFERENCE ON COMMUNICATION, CONTROL, COMPUTING AND ELECTRONICS ENGINEERING (ICCCCEE), 2017,
  • [2] The Key Techniques of the Network Anomaly Detection Based on Data Mining
    He Xiaobo
    [J]. PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS RESEARCH AND MECHATRONICS ENGINEERING, 2015, 121 : 1896 - 1899
  • [3] Survey on Anomaly Detection using Data Mining Techniques
    Agrawal, Shikha
    Agrawal, Jitendra
    [J]. KNOWLEDGE-BASED AND INTELLIGENT INFORMATION & ENGINEERING SYSTEMS 19TH ANNUAL CONFERENCE, KES-2015, 2015, 60 : 708 - 713
  • [4] Developing Data Mining Techniques for Intruder Detection in Network Traffic
    Agrawal, Amar
    Mohammed, Sabah
    Fiaidhi, Jinan
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (08): : 335 - 342
  • [5] Data Mining Approach for Anomaly Detection in Social Network Analysis
    Sudha, M. Swarna
    Priya, K. Arun
    Lakshmi, A. Kanaka
    Kruthika, A.
    Priya, D. Lakshmi
    Valarmathi, K.
    [J]. PROCEEDINGS OF THE 2018 SECOND INTERNATIONAL CONFERENCE ON INVENTIVE COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES (ICICCT), 2018, : 1862 - 1866
  • [6] A Survey on Blockchain Anomaly Detection Using Data Mining Techniques
    Li, Ji
    Gu, Chunxiang
    Wei, Fushan
    Chen, Xi
    [J]. BLOCKCHAIN AND TRUSTWORTHY SYSTEMS, BLOCKSYS 2019, 2020, 1156 : 491 - 504
  • [7] Promising Techniques for Anomaly Detection on Network Traffic
    Tian, Hui
    Liu, Jingtian
    Ding, Meimei
    [J]. COMPUTER SCIENCE AND INFORMATION SYSTEMS, 2017, 14 (03) : 597 - 609
  • [8] NETWORK TRAFFIC ANOMALY DETECTION USING CLUSTERING TECHNIQUES AND PERFORMANCE COMPARISON
    Liu, Duo
    Lung, Chung-Horng
    Lambadaris, Ioannis
    Seddigh, Nabil
    [J]. 2013 26TH ANNUAL IEEE CANADIAN CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING (CCECE), 2013, : 345 - 348
  • [9] Real Anomaly Detection in Telecommunication Multidimensional Data Using Data Mining Techniques
    Choros, Kazimierz
    [J]. COMPUTATIONAL COLLECTIVE INTELLIGENCE: TECHNOLOGIES AND APPLICATIONS, PT I, 2010, 6421 : 11 - 19
  • [10] A Hybrid Technique Using PCA and Wavelets in Network Traffic Anomaly Detection
    Novakov, Stevan
    Lung, Chung-Horng
    Lambadaris, Ioannis
    Seddigh, Nabil
    [J]. INTERNATIONAL JOURNAL OF MOBILE COMPUTING AND MULTIMEDIA COMMUNICATIONS, 2014, 6 (01) : 17 - 53