Anomaly-based Intrusion Detection using Tree Augmented Naive Bayes

被引:5
|
作者
Wester, Philip [1 ]
Heiding, Fredrik [1 ]
Lagerstrom, Robert [1 ]
机构
[1] KTH Royal Inst Technol, Sch Elect Engn & Comp Sci, Stockholm, Sweden
关键词
Intrusion detection; IDS; Anomaly detection; Tree Augmented Naive Bayes; TAN; Machine learning; Network based intrusion detection; SYSTEM;
D O I
10.1109/EDOCW52865.2021.00040
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Information technology is continuously becoming a more central part of society and together with the increased connectivity and inter-dependency of devices, it is becoming more important to keep systems secure. Most modern enterprises use some form of intrusion detection in order to detect hostile cyber activity that enters the organization. One of the major challenges of intrusion detection in computer networks is to detect types of intrusions that have previously not been encountered. These unknown intrusions are generally detected by methods collectively called anomaly detection. It is nowadays popular to use various artificial intelligence schemes to enhance anomaly detection of network traffic, and many state-of-the-art models reach a detection rate of well over 99%. One such promising algorithm is the Tree Augmented Naive Bayes (TAN) Classifier. However, it is crucial to implement TAN correctly in order to benefit from its full performance. This study implements a TAN classifier for anomaly based intrusion detection of computer network traffic, and displays practical insights on how to maximize its performance. The algorithm is implemented in two data sets with data from simulated cyber attacks: NSL-KDD and UNSW-NB15. We contribute to the field by validating the usefulness of TAN for anomaly detection in computer networks, as well as providing practical insights to new practitioners who want to utilize TAN in intrusion detection systems.
引用
下载
收藏
页码:112 / 121
页数:10
相关论文
共 50 条
  • [11] Anomaly-Based Network Intrusion Detection System
    Villalba, L. J. G.
    Orozco, A. L. S.
    Vidal, J. M.
    IEEE LATIN AMERICA TRANSACTIONS, 2015, 13 (03) : 850 - 855
  • [12] ANOMALY-BASED INTRUSION DETECTION THROUGH K-MEANS CLUSTERING AND NAIVES BAYES CLASSIFICATION
    Yassin, Warusia
    Udzir, Nur Izura
    Muda, Zaiton
    Sulaiman, Md. Nasir
    COMPUTING & INFORMATICS, 4TH INTERNATIONAL CONFERENCE, 2013, 2013, : 298 - 303
  • [13] Anomaly-Based Intrusion Detection System Using Support Vector Machine
    Krishnaveni, S.
    Vigneshwar, Palani
    Kishore, S.
    Jothi, B.
    Sivamohan, S.
    ARTIFICIAL INTELLIGENCE AND EVOLUTIONARY COMPUTATIONS IN ENGINEERING SYSTEMS, 2020, 1056 : 723 - 731
  • [14] Hybrid Intrusion Detection System using an Unsupervised method for Anomaly-based Detection
    Bhadauria, Saumya
    Mohanty, Tamanna
    2021 IEEE INTERNATIONAL CONFERENCE ON ADVANCED NETWORKS AND TELECOMMUNICATIONS SYSTEMS (IEEE ANTS), 2021,
  • [15] NETWORK INTRUSION DETECTION USING NAIVE BAYES
    Panda, Mrutyunjaya
    Patra, Manas Ranjan
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2007, 7 (12): : 258 - 263
  • [16] Anomaly-Based Intrusion Detection in IIoT Networks Using Transformer Models
    Casajus-Setien, Jorge
    Bielza, Concha
    Larranaga, Pedro
    2023 IEEE INTERNATIONAL CONFERENCE ON CYBER SECURITY AND RESILIENCE, CSR, 2023, : 72 - 77
  • [17] Anomaly-Based Intrusion Detection Using Machine Learning: An Ensemble Approach
    Lalduhsaka R.
    Bora N.
    Khan A.K.
    International Journal of Information Security and Privacy, 2022, 16 (01):
  • [18] An Anomaly-based Intrusion Detection System Using Butterfly Optimization Algorithm
    Mahboob, Amir Soltany
    Moghaddam, Mohammad Reza Ostadi
    2020 6TH IRANIAN CONFERENCE ON SIGNAL PROCESSING AND INTELLIGENT SYSTEMS (ICSPIS), 2020,
  • [19] An anomaly-based Network Intrusion Detection System using Deep learning
    Nguyen Thanh Van
    Tran Ngoc Thinh
    Le Thanh Sach
    2017 INTERNATIONAL CONFERENCE ON SYSTEM SCIENCE AND ENGINEERING (ICSSE), 2017, : 210 - 214
  • [20] Undermining an anomaly-based intrusion detection system using common exploits
    Tan, KMC
    Killourhy, KS
    Maxion, RA
    RECENT ADVANCES IN INTRUSION DETECTION, PROCEEDINGS, 2002, 2516 : 54 - 73