A Network Intrusion Detection Algorithm Based on Outlier Mining

被引:0
|
作者
Ding, Tianyi [1 ]
Zhang, Min [1 ]
He, Dongjie [2 ]
机构
[1] Elect Engn Inst, Hefei 230037, Anhui, Peoples R China
[2] Harbin Inst Technol, Harbin 150001, Heilongjiang, Peoples R China
关键词
Intrusion detection; Outliers; Spectral clustering; LOF algorithm; Data mining; SYSTEMS;
D O I
10.1007/978-981-10-6571-2_147
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
A spectral clustering and Local Outlier Factor (LOF) based outlier mining algorithm, which is aiming to solve network intrusion detection problem, is proposed in this paper. First of all, the structure of similarity matrix method in spectral clustering is used for data preprocessing to find out the smaller similarity objects. During this process, the pruning of the outliers is completed, and a set of candidate outliers is obtained. Then, we calculate the local outlier factor of each data object in this set through LOF algorithm. And the final results of detection of outliers are acquired. The experimental results show that the proposed algorithm improves the accuracy of detecting outliers and the effectiveness of network intrusion detection.
引用
收藏
页码:1229 / 1236
页数:8
相关论文
共 50 条
  • [1] Density Based Outlier Mining Algorithm with Application to Intrusion Detection
    Yang, Peng
    Huang, Biao
    [J]. PACIIA: 2008 PACIFIC-ASIA WORKSHOP ON COMPUTATIONAL INTELLIGENCE AND INDUSTRIAL APPLICATION, VOLS 1-3, PROCEEDINGS, 2008, : 489 - 492
  • [2] Distributed Intrusion Detection Based on Outlier Mining
    Da, Wei
    Ting, Han Shao
    [J]. PROCEEDINGS OF THE 2012 INTERNATIONAL CONFERENCE ON COMMUNICATION, ELECTRONICS AND AUTOMATION ENGINEERING, 2013, 181 : 343 - 348
  • [3] Clustering Algorithm Based on Outlier Detection for Anomaly Intrusion Detection
    Yin, Shang-Nan
    Kang, Ho-Seok
    Kim, Sung-Ryul
    [J]. JOURNAL OF INTERNET TECHNOLOGY, 2016, 17 (02): : 291 - 299
  • [4] Research of Outlier Mining Based Adaptive Intrusion Detection Techniques
    Ke, Fang Yu
    Yan, Fu
    Lin, Zhou Jun
    [J]. THIRD INTERNATIONAL CONFERENCE ON KNOWLEDGE DISCOVERY AND DATA MINING: WKDD 2010, PROCEEDINGS, 2010, : 552 - 555
  • [5] Anomaly Based Network Intrusion Detection with Unsupervised Outlier Detection
    Zhang, Jiong
    Zulkernine, Mohammad
    [J]. 2006 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-12, 2006, : 2388 - 2393
  • [6] Power information network intrusion detection based on data mining algorithm
    Xiaojun Zuo
    Ze Chen
    Limian Dong
    Jie Chang
    Botao Hou
    [J]. The Journal of Supercomputing, 2020, 76 : 5521 - 5539
  • [7] Power information network intrusion detection based on data mining algorithm
    Zuo, Xiaojun
    Chen, Ze
    Dong, Limian
    Chang, Jie
    Hou, Botao
    [J]. JOURNAL OF SUPERCOMPUTING, 2020, 76 (07): : 5521 - 5539
  • [8] Anomaly-Based Network Intrusion Detection: An Outlier Detection Techniques
    Kumar, Neeraj
    Kumar, Upendra
    [J]. PROCEEDINGS OF THE EIGHTH INTERNATIONAL CONFERENCE ON SOFT COMPUTING AND PATTERN RECOGNITION (SOCPAR 2016), 2018, 614 : 262 - 269
  • [9] Robust Network Intrusion Detection Systems for Outlier Detection
    Desai, Rohan
    Venkatesh, T. G.
    [J]. 2022 IEEE 27TH INTERNATIONAL WORKSHOP ON COMPUTER AIDED MODELING AND DESIGN OF COMMUNICATION LINKS AND NETWORKS (CAMAD), 2022, : 140 - 146
  • [10] NETWORK INTRUSION DETECTION MECHANISMS USING OUTLIER DETECTION
    Nagamani, Ch.
    Chittineni, Suneetha
    [J]. PROCEEDINGS OF THE 2018 SECOND INTERNATIONAL CONFERENCE ON INVENTIVE COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES (ICICCT), 2018, : 1468 - 1473