Network Intrusion Detection using Diversity-based Centroid Mechanism

被引:5
|
作者
Gondal, Muhammad Shafique [1 ]
Malik, Arif Jamal [2 ]
Khan, Farrukh Aslam [1 ,3 ]
机构
[1] Natl Univ Comp & Emerging Sci, Dept Comp Sci, AK Brohi Rd H-11-4, Islamabad, Pakistan
[2] Fdn Univ, Dept Software Engn, Rawalpindi, Pakistan
[3] King Saud Univ, Ctr Excellence Informat Assurance, Riyadh, Saudi Arabia
关键词
Intrusion Detection System (IDS); Centroid; Diversity; Classification;
D O I
10.1109/ITNG.2015.42
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Threats to computer networks are numerous and potentially devastating. Intrusion detection techniques provide protection to our data and track unauthorized access. Many algorithms and techniques have been proposed to improve the accuracy and minimize the false positive rate of the intrusion detection system (IDS). Statistical techniques, evolutionary techniques, and data mining techniques have also been used for this purpose. In this paper, we use a centroid-based technique for network intrusion detection in which the centroid is constructed on the basis of diversity. Diversity of a point is the sum of the distances from a point to all other points in a cluster. The point having minimum diversity is chosen as a centroid. The performance of diversity-based centroid shows significant improvement in the classification of intrusions. Experimental results on the KDDCup99 dataset demonstrate that the proposed method shows excellent performance in terms of accuracy, detection rate, and false positive rate.
引用
收藏
页码:224 / 228
页数:5
相关论文
共 50 条
  • [31] DIVERSITY-BASED INFERENCE OF FINITE AUTOMATA
    RIVEST, RL
    SCHAPIRE, RE
    JOURNAL OF THE ACM, 1994, 41 (03) : 555 - 589
  • [32] Vulnerability-Aware Resilient Networks: Software Diversity-Based Network Adaptation
    Zhang, Qisheng
    Cho, Jin-Hee
    Moore, Terrence J.
    Chen, Ing-Ray
    IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2021, 18 (03): : 3154 - 3169
  • [33] NETWORK INTRUSION DETECTION MECHANISMS USING OUTLIER DETECTION
    Nagamani, Ch.
    Chittineni, Suneetha
    PROCEEDINGS OF THE 2018 SECOND INTERNATIONAL CONFERENCE ON INVENTIVE COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES (ICICCT), 2018, : 1468 - 1473
  • [34] Network connection based intrusion detection using rough set classification
    Zhang, Hongmei
    Wang, Xingyu
    Wang, Yong
    2006 INTERNATIONAL CONFERENCE ON COMMUNICATIONS, CIRCUITS AND SYSTEMS PROCEEDINGS, VOLS 1-4: VOL 1: SIGNAL PROCESSING, 2006, : 2128 - +
  • [35] Intrusion Detection Using Flow-Based Analysis of Network Traffic
    David, Jisa
    Thomas, Ciza
    ADVANCES IN NETWORKS AND COMMUNICATIONS, PT II, 2011, 132 : 391 - 399
  • [36] Host-Based Intrusion Detection Model Using Siamese Network
    Park, Daekyeong
    Kim, Sangsoo
    Kwon, Hyukjin
    Shin, Dongil
    Shin, Dongkyoo
    IEEE ACCESS, 2021, 9 : 76614 - 76623
  • [37] FPGA based network intrusion detection using content addressable memories
    Bu, L
    Chandy, JA
    12TH ANNUAL IEEE SYMPOSIUM ON FIELD-PROGRAMMABLE CUSTOM COMPUTING MACHINES, PROCEEDINGS, 2004, : 316 - 317
  • [38] Anomaly based Resilient Network Intrusion Detection using Inferential Autoencoders
    Hannan, Abdul
    Gruhl, Christian
    Sick, Bernhard
    PROCEEDINGS OF THE 2021 IEEE INTERNATIONAL CONFERENCE ON CYBER SECURITY AND RESILIENCE (IEEE CSR), 2021, : 1 - 7
  • [39] Network-based anomaly intrusion detection system using SOMs
    Depren, MÖ
    Topallar, M
    Anarim, E
    Ciliz, K
    PROCEEDINGS OF THE IEEE 12TH SIGNAL PROCESSING AND COMMUNICATIONS APPLICATIONS CONFERENCE, 2004, : 76 - 79
  • [40] Intrusion Detection System Using Voting-Based Neural Network
    Mohammad Hashem Haghighat
    Jun Li
    Tsinghua Science and Technology, 2021, 26 (04) : 484 - 495