Enhanced intrusion detection system via agent clustering and classification based on outlier detection

被引:15
|
作者
Sandosh, S. [1 ]
Govindasamy, V [2 ]
Akila, G. [1 ]
机构
[1] Pondicherry Engn Coll, Dept Comp Sci & Engn, Pondicherry, India
[2] Pondicherry Engn Coll, Dept Informat Technol, Pondicherry, India
关键词
Intrusion detection system (IDS); Agent Clustering & Classification (ACC); Outlier detection (OD); K-nearest neighbour (KNN); CLOUD;
D O I
10.1007/s12083-019-00822-3
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The rapid evolution of cloud computing technology has enabled seamless connection of devices on a broad spectrum. Also, it enables storage of massive quantity of data in the form of data centers. This suggests a shared pool of resources where users situated all over the world have access to the aforementioned data centers. Such a framework has cyber-security based challenges where it becomes vulnerable to external attacks. There arises a need for an Intrusion Detection System (IDS) to prevent the system from unwanted and malicious attacks. However, the existing IDS have not been able to efficiently combinehigh accuracy with low complexity and time efficiency. In order to overcome these challenges an Enhanced Intrusion Detection System via Agent Clustering and Classification based on Outlier Detection (EIDS-ACC-OD) is proposed. At first, preprocessing is performed to remove unwanted spaces using outlier detection. Then modified K-means clustering algorithm is developed for data segmentation. Further, K-Nearest Neighbor (KNN) is utilized for categorization of the attacks.
引用
收藏
页码:1038 / 1045
页数:8
相关论文
共 50 条
  • [21] Anomaly Based Network Intrusion Detection with Unsupervised Outlier Detection
    Zhang, Jiong
    Zulkernine, Mohammad
    2006 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-12, 2006, : 2388 - 2393
  • [22] Intrusion Detection System (IDS): Anomaly Detection using Outlier Detection Approach
    Jabez, J.
    Muthukumar, B.
    INTERNATIONAL CONFERENCE ON COMPUTER, COMMUNICATION AND CONVERGENCE (ICCC 2015), 2015, 48 : 338 - 346
  • [23] Grid-Based and Outlier Detection-Based Data Clustering and Classification
    Cho, Kyu Cheol
    Lee, Jong Sik
    UBIQUITOUS COMPUTING AND MULTIMEDIA APPLICATIONS, PT I, 2011, 150 : 129 - 138
  • [24] Clustering-Based Network Intrusion Detection System
    Fan, Chun-I
    Lai, Yen-Lin
    Shie, Cheng-Han
    2022 5TH IEEE CONFERENCE ON DEPENDABLE AND SECURE COMPUTING (IEEE DSC 2022), 2022,
  • [25] MULTILAYER INTRUSION DETECTION SYSTEM BASED ON SEMISUPERVISED CLUSTERING
    Wang, Caihong
    Huang, Run
    Zhang, Weihang
    Sun, Jian
    2019 16TH INTERNATIONAL COMPUTER CONFERENCE ON WAVELET ACTIVE MEDIA TECHNOLOGY AND INFORMATION PROCESSING (ICWAMTIP), 2019, : 355 - 360
  • [26] Grid-based & Outlier Detection-based Data Clustering & Classification
    Cho, Kyu Cheol
    Lee, Jong Sik
    INFORMATION-AN INTERNATIONAL INTERDISCIPLINARY JOURNAL, 2012, 15 (03): : 1253 - 1266
  • [27] Distributed Intrusion Detection Based on Outlier Mining
    Da, Wei
    Ting, Han Shao
    PROCEEDINGS OF THE 2012 INTERNATIONAL CONFERENCE ON COMMUNICATION, ELECTRONICS AND AUTOMATION ENGINEERING, 2013, 181 : 343 - 348
  • [28] Anomaly detection enhanced classification in computer intrusion detection
    Fugate, M
    Gattiker, JR
    PATTERN RECOGNITION WITH SUPPORT VECTOR MACHINES, PROCEEDINGS, 2002, 2388 : 186 - 197
  • [29] Methodically Unified Procedures for Outlier Detection, Clustering and Classification
    Kulczycki, Piotr
    PROCEEDINGS OF THE FUTURE TECHNOLOGIES CONFERENCE (FTC) 2019, VOL 1, 2020, 1069 : 460 - 474
  • [30] CIDS: An agent-based intrusion detection system
    Dasgupta, D
    Gonzalez, F
    Yallapu, K
    Gomez, J
    Yarramsettii, R
    COMPUTERS & SECURITY, 2005, 24 (05) : 387 - 398