Combining Conjunctive Rule Extraction with Diffusion Maps for Network Intrusion Detection

被引:0
|
作者
Juvonen, Antti [1 ]
Sipola, Tuomo [1 ]
机构
[1] Univ Jyvaskyla, Dept Math Informat Technol, Jyvaskyla, Finland
关键词
Intrusion detection; anomaly detection; n-gram; rule extraction; diffusion map; data mining; machine learning;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Network security and intrusion detection are important in the modern world where communication happens via information networks. Traditional signature-based intrusion detection methods cannot find previously unknown attacks. On the other hand, algorithms used for anomaly detection often have black box qualities that are difficult to understand for people who are not algorithm experts. Rule extraction methods create interpretable rule sets that act as classifiers. They have mostly been combined with already labeled data sets. This paper aims to combine unsupervised anomaly detection with rule extraction techniques to create an online anomaly detection framework. Unsupervised anomaly detection uses diffusion maps and clustering for labeling an unknown data set. Rule sets are created using conjunctive rule extraction algorithm. This research suggests that the combination of machine learning methods and rule extraction is a feasible way to implement network intrusion detection that is meaningful to network administrators.
引用
收藏
页数:6
相关论文
共 50 条
  • [41] DAREnsemble: Decision Tree and Rule Learner Based Ensemble for Network Intrusion Detection System
    Gaikwad, Dwarkoba
    Thool, Ravindra
    [J]. PROCEEDINGS OF FIRST INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY FOR INTELLIGENT SYSTEMS: VOL 1, 2016, 50 : 185 - 193
  • [42] Parametric observation rule-based intrusion detection strategy for in-vehicle network
    Ke, Junan
    Deng, Weiping
    Wang, Shanshan
    Li, Jie
    [J]. 2023 35TH CHINESE CONTROL AND DECISION CONFERENCE, CCDC, 2023, : 2676 - 2681
  • [43] Unravelling Network-Based Intrusion Detection: A Neutrosophic Rule Mining and Optimization Framework
    Dias, Tiago Fontes
    Vitorino, Joao
    Fonseca, Tiago
    Praca, Isabel
    Maia, Eva
    Viamonte, Maria Joao
    [J]. COMPUTER SECURITY. ESORICS 2023 INTERNATIONAL WORKSHOPS, CPS4CIP, PT II, 2024, 14399 : 59 - 75
  • [44] Detecting and resolving conflict for network intrusion rule
    Sun, Meifeng
    Gong, Jian
    [J]. Dongnan Daxue Xuebao (Ziran Kexue Ban)/Journal of Southeast University (Natural Science Edition), 2006, 36 (04): : 522 - 525
  • [45] Mining network data for intrusion detection through combining SVMs with ant colony networks
    Feng, Wenying
    Zhang, Qinglei
    Hu, Gongzhu
    Huang, Jimmy Xiangji
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2014, 37 : 127 - 140
  • [46] Wireless Intrusion Detection: Not as easy as traditional network intrusion detection
    Tao, Zhiqi
    Ruighaver, A. B.
    [J]. TENCON 2005 - 2005 IEEE REGION 10 CONFERENCE, VOLS 1-5, 2006, : 2513 - +
  • [47] L-KPCA: an efficient feature extraction method for network intrusion detection
    Chen, Jinfu
    Yin, Shang
    Cai, Saihua
    Zhao, Lingling
    Wang, Shengran
    [J]. 2021 17TH INTERNATIONAL CONFERENCE ON MOBILITY, SENSING AND NETWORKING (MSN 2021), 2021, : 683 - 684
  • [48] Kernel PCA based network intrusion feature extraction and detection using SVM
    Gao, HH
    Yang, HH
    Wang, XY
    [J]. ADVANCES IN NATURAL COMPUTATION, PT 2, PROCEEDINGS, 2005, 3611 : 89 - 94
  • [49] A Novel Feature Extraction Method Assembled with PCA and ICA for Network Intrusion Detection
    Xie, Lei
    Li, Jin
    [J]. 2009 INTERNATIONAL FORUM ON COMPUTER SCIENCE-TECHNOLOGY AND APPLICATIONS, VOL 3, PROCEEDINGS, 2009, : 31 - 34
  • [50] Network anomaly intrusion detection CVM model based on PLS feature extraction
    Wu, Li-Yun
    Li, Sheng-Lin
    Gan, Xu-Sheng
    Wang, Ming-Hua
    [J]. Kongzhi yu Juece/Control and Decision, 2017, 32 (04): : 755 - 758