Combining Conjunctive Rule Extraction with Diffusion Maps for Network Intrusion Detection

被引:0
|
作者
Juvonen, Antti [1 ]
Sipola, Tuomo [1 ]
机构
[1] Univ Jyvaskyla, Dept Math Informat Technol, Jyvaskyla, Finland
关键词
Intrusion detection; anomaly detection; n-gram; rule extraction; diffusion map; data mining; machine learning;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Network security and intrusion detection are important in the modern world where communication happens via information networks. Traditional signature-based intrusion detection methods cannot find previously unknown attacks. On the other hand, algorithms used for anomaly detection often have black box qualities that are difficult to understand for people who are not algorithm experts. Rule extraction methods create interpretable rule sets that act as classifiers. They have mostly been combined with already labeled data sets. This paper aims to combine unsupervised anomaly detection with rule extraction techniques to create an online anomaly detection framework. Unsupervised anomaly detection uses diffusion maps and clustering for labeling an unknown data set. Rule sets are created using conjunctive rule extraction algorithm. This research suggests that the combination of machine learning methods and rule extraction is a feasible way to implement network intrusion detection that is meaningful to network administrators.
引用
收藏
页数:6
相关论文
共 50 条
  • [21] Network Intrusion Detection Using Class Association Rule Mining Based on Genetic Network Programming
    Chen, Ci
    Mabu, Shingo
    Shimada, Kaoru
    Hirasawa, Kotaro
    [J]. IEEJ TRANSACTIONS ON ELECTRICAL AND ELECTRONIC ENGINEERING, 2010, 5 (05) : 553 - 559
  • [22] Network Intrusion Detection Based on Directed Acyclic Graph and Belief Rule Base
    Zhang, Bang-Cheng
    Hu, Guan-Yu
    Zhou, Zhi-Jie
    Zhang, You-Min
    Qiao, Pei-Li
    Chang, Lei-Lei
    [J]. ETRI JOURNAL, 2017, 39 (04) : 592 - 604
  • [23] Automated Flow-based Rule Generation for Network Intrusion Detection Systems
    Fallahi, Naser
    Sami, Ashkan
    Tajbakhsh, Morteza
    [J]. 2016 24TH IRANIAN CONFERENCE ON ELECTRICAL ENGINEERING (ICEE), 2016, : 1948 - 1953
  • [24] Network Intrusion Detection Method Combining CNN and BiLSTM in Cloud Computing Environment
    Gao, Jing
    [J]. COMPUTATIONAL INTELLIGENCE AND NEUROSCIENCE, 2022, 2022
  • [25] An effective combining classifier approach using tree algorithms for network intrusion detection
    Jasmin Kevric
    Samed Jukic
    Abdulhamit Subasi
    [J]. Neural Computing and Applications, 2017, 28 : 1051 - 1058
  • [26] An effective combining classifier approach using tree algorithms for network intrusion detection
    Kevric, Jasmin
    Jukic, Samed
    Subasi, Abdulhamit
    [J]. NEURAL COMPUTING & APPLICATIONS, 2017, 28 : S1051 - S1058
  • [27] Deep Learning Approach Combining Sparse Autoencoder With SVM for Network Intrusion Detection
    Al-Qatf, Majjed
    Yu Lasheng
    Al-Habib, Mohammed
    Al-Sabahi, Kamal
    [J]. IEEE ACCESS, 2018, 6 : 52843 - 52856
  • [28] A Comparison of Feature Selection and Feature Extraction in Network Intrusion Detection Systems
    Vuong, Tuan-Cuong
    Tran, Hung
    Trang, Mai Xuan
    Ngo, Vu-Duc
    Van Luong, Thien
    [J]. PROCEEDINGS OF 2022 ASIA-PACIFIC SIGNAL AND INFORMATION PROCESSING ASSOCIATION ANNUAL SUMMIT AND CONFERENCE (APSIPA ASC), 2022, : 1798 - 1804
  • [29] A Fusion of Feature Extraction and Feature Selection Technique for Network Intrusion Detection
    Hamid, Yasir
    Sugumaran, M.
    Journaux, Ludovic
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (08): : 151 - 158
  • [30] cFEM: a cluster based feature extraction method for network intrusion detection
    Mazumder, Md. Mumtahin Habib Ullah
    Kadir, Md. Eusha
    Sharmin, Sadia
    Islam, Md. Shariful
    Alam, Muhammad Mahbub
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2023, 22 (05) : 1355 - 1369