Network Intrusion Detection using Diversity-based Centroid Mechanism

被引:5
|
作者
Gondal, Muhammad Shafique [1 ]
Malik, Arif Jamal [2 ]
Khan, Farrukh Aslam [1 ,3 ]
机构
[1] Natl Univ Comp & Emerging Sci, Dept Comp Sci, AK Brohi Rd H-11-4, Islamabad, Pakistan
[2] Fdn Univ, Dept Software Engn, Rawalpindi, Pakistan
[3] King Saud Univ, Ctr Excellence Informat Assurance, Riyadh, Saudi Arabia
关键词
Intrusion Detection System (IDS); Centroid; Diversity; Classification;
D O I
10.1109/ITNG.2015.42
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Threats to computer networks are numerous and potentially devastating. Intrusion detection techniques provide protection to our data and track unauthorized access. Many algorithms and techniques have been proposed to improve the accuracy and minimize the false positive rate of the intrusion detection system (IDS). Statistical techniques, evolutionary techniques, and data mining techniques have also been used for this purpose. In this paper, we use a centroid-based technique for network intrusion detection in which the centroid is constructed on the basis of diversity. Diversity of a point is the sum of the distances from a point to all other points in a cluster. The point having minimum diversity is chosen as a centroid. The performance of diversity-based centroid shows significant improvement in the classification of intrusions. Experimental results on the KDDCup99 dataset demonstrate that the proposed method shows excellent performance in terms of accuracy, detection rate, and false positive rate.
引用
收藏
页码:224 / 228
页数:5
相关论文
共 50 条
  • [1] A Taxonomy of Attacks with Applications to Diversity-based Intrusion Detection
    Nadjarbashi-Noghani, Mehran
    Ghorbani, Ali A.
    JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2006, 1 (03): : 217 - 227
  • [2] A Study on Intrusion Detection Using Centroid-Based Classification
    Setiawan, Bambang
    Djanali, Supeno
    Ahmad, Tohari
    4TH INFORMATION SYSTEMS INTERNATIONAL CONFERENCE (ISICO 2017), 2017, 124 : 672 - 681
  • [3] A Diversity-based Algorithm for Energy Detection
    Qin, Zhenquan
    Liu, Delong
    Sun, Weifeng
    Hu, Yan
    Hui, Huang
    MATERIAL SCIENCE AND ENGINEERING TECHNOLOGY, 2012, 462 : 336 - 343
  • [4] A diversity-based multi-antenna cooperative detection model in cognitive radio network
    1600, Digital Information Research Foundation, 2 Srinivasamoorthy Avenue, L.B Road, Adyar, Chennai, 600 020, India (11):
  • [5] An Effective Network Intrusion Detection Using Hellinger Distance-Based Monitoring Mechanism
    Bouyeddou, Benamar
    Harrou, Fouzi
    Sun, Ying
    Kadri, Benamar
    PROCEEDINGS OF THE 2018 INTERNATIONAL CONFERENCE ON APPLIED SMART SYSTEMS (ICASS), 2018,
  • [6] Edge computing and AIoT based network intrusion detection mechanism
    Sui, Qingru
    Liu, Xiaoyan
    INTERNET TECHNOLOGY LETTERS, 2023, 6 (05)
  • [7] Network Intrusion Detection Based on Self-Attention Mechanism and BIGRU
    Du, Xuran
    Gan, Gang
    2024 2ND INTERNATIONAL CONFERENCE ON MOBILE INTERNET, CLOUD COMPUTING AND INFORMATION SECURITY, MICCIS 2024, 2024, : 236 - 241
  • [8] Assessing Centroid-Based Classification Models for Intrusion Detection System Using Composite Indicators
    Setiawan, Bambang
    Djanali, Supeno
    Ahmad, Tohari
    Aziz, Moh Nasrul
    FIFTH INFORMATION SYSTEMS INTERNATIONAL CONFERENCE, 2019, 161 : 665 - 676
  • [9] Network Intrusion Detection based on Dense Dilated Convolutions and Attention Mechanism
    Cao, Ke
    Zhu, Jinqi
    Feng, Weijia
    Ma, Chunmei
    Liu, Ming
    Du, Tian
    IWCMC 2021: 2021 17TH INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE (IWCMC), 2021, : 463 - 468
  • [10] Diversity-Based Media Search
    Aarabi, Parham
    2022 IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA AND EXPO WORKSHOPS (IEEE ICMEW 2022), 2022,