An Anomaly-Based IDS Framework Using Centroid-Based Classification

被引:4
|
作者
Lin, Iuon-Chang [1 ]
Chang, Ching-Chun [2 ]
Peng, Chih-Hsiang [1 ]
机构
[1] Natl Chung Hsing Univ, Dept Management Informat Syst, Taichung 402, Taiwan
[2] Univ Warwick, Dept Comp Sci, Coventry CV4 7AL, W Midlands, England
来源
SYMMETRY-BASEL | 2022年 / 14卷 / 01期
关键词
DDoS; SYN flood; IDS; centroid-based classification; K-means; KNN; INTRUSION DETECTION SYSTEM; DDOS ATTACKS; NETWORK; DEFENSE;
D O I
10.3390/sym14010105
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
Botnet is an urgent problem that will reduce the security and availability of the network. When the bot master launches attacks to certain victims, the infected users are awakened, and attacks start according to the commands from the bot master. Via Botnet, DDoS is an attack whose purpose is to paralyze the victim's service. In all kinds of DDoS, SYN flood is still a problem that reduces security and availability. To enhance the security of the Internet, IDS is proposed to detect attacks and protect the server. In this paper, the concept of centroid-based classification is used to enhance performance of the framework. An anomaly-based IDS framework which combines K-means and KNN is proposed to detect SYN flood. Dimension reduction is designed to achieve visualization, and weights can adjust the occupancy ratio of each sub-feature. Therefore, this framework is also suitable for use on the modern symmetry or asymmetry architecture of information systems. With the detection by the framework proposed in this paper, the detection rate is 96.8 percent, the accuracy rate is 97.3 percent, and the false alarm rate is 1.37 percent.
引用
收藏
页数:19
相关论文
共 50 条
  • [31] A centroid-based gene selection method for microarray data classification
    Guo, Shun
    Guo, Donghui
    Chen, Lifei
    Jiang, Qingshan
    [J]. JOURNAL OF THEORETICAL BIOLOGY, 2016, 400 : 32 - 41
  • [32] Enabling Dynamic Network Access Control with Anomaly-based IDS and SDN
    Li, Hongda
    Wei, Feng
    Hu, Hongxin
    [J]. PROCEEDINGS OF THE ACM INTERNATIONAL WORKSHOP ON SECURITY IN SOFTWARE DEFINED NETWORKS & NETWORK FUNCTION VIRTUALIZATION (SDN-NFV '19), 2019, : 13 - 16
  • [33] Hybrid of anomaly-based and specification-based IDS for Internet of Things using unsupervised OPF based on MapReduce approach
    Bostani, Hamid
    Sheikhan, Mansour
    [J]. COMPUTER COMMUNICATIONS, 2017, 98 : 52 - 71
  • [34] Assessing Centroid-Based Classification Models for Intrusion Detection System Using Composite Indicators
    Setiawan, Bambang
    Djanali, Supeno
    Ahmad, Tohari
    Aziz, Moh Nasrul
    [J]. FIFTH INFORMATION SYSTEMS INTERNATIONAL CONFERENCE, 2019, 161 : 665 - 676
  • [35] Optimizing anomaly-based attack detection using classification machine learning
    Gouda, Hany Abdelghany
    Ahmed, Mohamed Abdelslam
    Roushdy, Mohamed Ismail
    [J]. NEURAL COMPUTING & APPLICATIONS, 2024, 36 (06): : 3239 - 3257
  • [36] Optimizing anomaly-based attack detection using classification machine learning
    Hany Abdelghany Gouda
    Mohamed Abdelslam Ahmed
    Mohamed Ismail Roushdy
    [J]. Neural Computing and Applications, 2024, 36 : 3239 - 3257
  • [37] Centroid-based sifting for empiricalmode decomposition
    Hong, Hong
    Wang, Xin-Long
    Tao, Zhi-Yong
    Du, Shuan-Ping
    [J]. Journal of Zhejiang University: Science C, 2011, 12 (02): : 88 - 95
  • [38] RANDOM CENTROID INITIALIZATION FOR IMPROVING CENTROID-BASED CLUSTERING
    Romanuke V.V.
    [J]. Decision Making: Applications in Management and Engineering, 2023, 6 (02): : 734 - 746
  • [39] Some similarity coefficients and application of data mining techniques to the anomaly-based IDS
    Nikolova, Evgeniya
    Jecheva, Veselina
    [J]. TELECOMMUNICATION SYSTEMS, 2012, 50 (02) : 127 - 135
  • [40] Graph and Centroid-based Word Clustering
    Thaiprayoon, Santipong
    Unger, Herwig
    Kubek, Mario
    [J]. 2020 4TH INTERNATIONAL CONFERENCE ON NATURAL LANGUAGE PROCESSING AND INFORMATION RETRIEVAL, NLPIR 2020, 2020, : 163 - 168