Hybrid Approach for Detection of Anomaly Network Traffic using Data Mining Techniques

被引:40
|
作者
Agarwal, Basant [1 ]
Mittal, Namita [1 ]
机构
[1] Malviya Natl Inst Technol Jaipur, Dept Comp Engn, Jaipur 302016, Rajasthan, India
关键词
Anomaly detection; data mining; support vector machine;
D O I
10.1016/j.protcy.2012.10.121
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Anomaly based Intrusion Detection System (IDS) is getting popularity due to its adaptability to the changes in the behavior of network traffic as it has the ability to detect the new attacks. As it is very difficult to set any predefined rule for identifying correctly attack traffic since there is no major difference between normal and attack traffic. In this paper, Anomaly traffic detection system based on the Entropy of network features and Support Vector Machine (SVM) are compared. Further, a hybrid technique that is combination of both entropy of network features and support vector machine is compared with individual methods. DARPA Intrusion Detection Evaluation dataset is used in order to evaluate the methods. It is proved that entropy based detection technique is capable of identifying anomalies in network better than support vector machine based detection system. In addition, hybrid approach outperforms entropy and SVM based techniques. (C) 2012 The Authors. Published by Elsevier Ltd. Selection and/or peer-review under responsibility of the Department of Computer Science & Engineering, National Institute of Technology Rourkela
引用
收藏
页码:996 / 1003
页数:8
相关论文
共 50 条
  • [31] Synergy of Blockchain Technology and Data Mining Techniques for Anomaly Detection
    Kamisalic, Aida
    Kramberger, Renata
    Fister, Iztok, Jr.
    [J]. APPLIED SCIENCES-BASEL, 2021, 11 (17):
  • [32] Design of Network Traffic Anomaly Monitoring System Based on Data Mining
    Huang, Yanling
    Huang, Liusong
    [J]. ADVANCED HYBRID INFORMATION PROCESSING, ADHIP 2022, PT I, 2023, 468 : 549 - 563
  • [33] KMDT: A Hybrid Cluster Approach for Anomaly Detection Using Big Data
    Thakur, Santosh
    Dharavath, Ramesh
    [J]. INFORMATION AND DECISION SCIENCES, 2018, 701 : 169 - 176
  • [34] Intelligent Network Intrusion Detection System using Data Mining Techniques
    Sultana, Amreen
    Jabbar, M. A.
    [J]. PROCEEDINGS OF THE 2016 2ND INTERNATIONAL CONFERENCE ON APPLIED AND THEORETICAL COMPUTING AND COMMUNICATION TECHNOLOGY (ICATCCT), 2016, : 329 - 333
  • [35] Network Intrusion Detection System Using various data mining techniques
    DikshantGupta
    SuhaniSinghal
    Malik, Shamita
    Singh, Archana
    [J]. 2016 INTERNATIONAL CONFERENCE ON RESEARCH ADVANCES IN INTEGRATED NAVIGATION SYSTEMS (RAINS), 2016,
  • [36] Anomaly detection in network traffic
    Duraj, Agnieszka
    Bucki, Pawel
    Drajling, Aleksander
    Makrocki, Robert
    Sipinski, Mateusz
    [J]. PRZEGLAD ELEKTROTECHNICZNY, 2022, 98 (12): : 205 - 208
  • [37] Visualization of Data Cubes for Anomaly Detection in Network Traffic Data Streams
    Ahlers, Volker
    Laue, Tim
    Wellermann, Nils
    Heine, Felix
    [J]. PROCEEDINGS OF THE THE 11TH IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT DATA ACQUISITION AND ADVANCED COMPUTING SYSTEMS: TECHNOLOGY AND APPLICATIONS (IDAACS'2021), VOL 1, 2021, : 272 - 277
  • [38] Network traffic anomaly detection using PCA and BiGAN
    Patil, Rajlaxmi
    Biradar, Rajshekhar
    Ravi, Vinayakumar
    Biradar, Poornima
    Ghosh, Uttam
    [J]. INTERNET TECHNOLOGY LETTERS, 2022, 5 (01)
  • [39] Automated Feature Selection for Anomaly Detection in Network Traffic Data
    Nakashima, Makiya
    Sim, Alex
    Kim, Youngsoo
    Kim, Jonghyun
    Kim, Jinoh
    [J]. ACM TRANSACTIONS ON MANAGEMENT INFORMATION SYSTEMS, 2021, 12 (03)
  • [40] Hubble: An End to End Approach for Anomaly Detection in Network Traffic
    Wang, Shiwei
    Du, Haizhou
    Liu, Lin
    Lin, Zhenyu
    [J]. PROCEEDINGS OF THE 2021 IEEE 16TH CONFERENCE ON INDUSTRIAL ELECTRONICS AND APPLICATIONS (ICIEA 2021), 2021, : 516 - 521