Combining Conjunctive Rule Extraction with Diffusion Maps for Network Intrusion Detection

被引:0
|
作者
Juvonen, Antti [1 ]
Sipola, Tuomo [1 ]
机构
[1] Univ Jyvaskyla, Dept Math Informat Technol, Jyvaskyla, Finland
关键词
Intrusion detection; anomaly detection; n-gram; rule extraction; diffusion map; data mining; machine learning;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Network security and intrusion detection are important in the modern world where communication happens via information networks. Traditional signature-based intrusion detection methods cannot find previously unknown attacks. On the other hand, algorithms used for anomaly detection often have black box qualities that are difficult to understand for people who are not algorithm experts. Rule extraction methods create interpretable rule sets that act as classifiers. They have mostly been combined with already labeled data sets. This paper aims to combine unsupervised anomaly detection with rule extraction techniques to create an online anomaly detection framework. Unsupervised anomaly detection uses diffusion maps and clustering for labeling an unknown data set. Rule sets are created using conjunctive rule extraction algorithm. This research suggests that the combination of machine learning methods and rule extraction is a feasible way to implement network intrusion detection that is meaningful to network administrators.
引用
收藏
页数:6
相关论文
共 50 条
  • [1] Predictive Rule Discovery for Network Intrusion Detection
    Patel, Kanubhai
    Buddhadev, Bharat
    [J]. INTELLIGENT DISTRIBUTED COMPUTING, 2015, 321 : 287 - 298
  • [2] Combining heterogeneous classifiers for network intrusion detection
    Borji, Ali
    [J]. ADVANCES IN COMPUTER SCIENCE - ASIAN 2007: COMPUTER AND NETWORK SECURITY, PROCEEDINGS, 2007, 4846 : 254 - 260
  • [3] A Statistical Rule Learning Approach to Network Intrusion Detection
    Rastegari, Samaneh
    Lam, Chiou-Peng
    Hingston, Philip
    [J]. 2015 5TH INTERNATIONAL CONFERENCE ON IT CONVERGENCE AND SECURITY (ICITCS), 2015,
  • [4] An Intrusion Detection Scheme Combining FCM and Kohonen Network
    Chen Ming-xia
    Zhang Han
    Li Shun-yan
    [J]. 2019 11TH INTERNATIONAL CONFERENCE ON MEASURING TECHNOLOGY AND MECHATRONICS AUTOMATION (ICMTMA 2019), 2019, : 239 - 243
  • [5] POSTER: SMURFEN: A Rule Sharing Collaborative Intrusion Detection Network
    Fung, Carol
    Zhu, Quanyan
    Boutaba, Raouf
    Basar, Tamer
    [J]. PROCEEDINGS OF THE 18TH ACM CONFERENCE ON COMPUTER & COMMUNICATIONS SECURITY (CCS 11), 2011, : 761 - 763
  • [6] Rule Hashing for Efficient Packet Classification in Network Intrusion Detection
    Yoshioka, Atsushi
    Shaikot, Shariful Hasan
    Kim, Min Sik
    [J]. 2008 PROCEEDINGS OF 17TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS, VOLS 1 AND 2, 2008, : 614 - 619
  • [7] Network Intrusion Traffic Detection Based on Feature Extraction
    Yu, Xuecheng
    Huang, Yan
    Zhang, Yu
    Song, Mingyang
    Jia, Zhenhong
    [J]. CMC-COMPUTERS MATERIALS & CONTINUA, 2024, 78 (01): : 473 - 492
  • [8] Network Intrusion Detection by combining one-class classifiers
    Giacinto, G
    Perdisci, R
    Roli, F
    [J]. IMAGE ANALYSIS AND PROCESSING - ICIAP 2005, PROCEEDINGS, 2005, 3617 : 58 - 65
  • [9] An Improved PSO-Based Rule Extraction Algorithm for Intrusion Detection
    Zhao Chang
    Wang Wei-ping
    [J]. PROCEEDINGS OF THE 2009 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND NATURAL COMPUTING, VOL II, 2009, : 56 - 58
  • [10] Rule extraction from neural networks for intrusion detection in computer networks
    Hofmann, A
    Schmitz, C
    [J]. 2003 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN AND CYBERNETICS, VOLS 1-5, CONFERENCE PROCEEDINGS, 2003, : 1259 - 1265