A model for anomaly classification in intrusion detection systems

被引:1
|
作者
Ferreira, V. O. [1 ]
Galhardi, V. V. [1 ]
Goncalves, L. B. L. [1 ]
Silva, R. C. [1 ]
Cansian, A. M. [1 ]
机构
[1] Salo Paulo State Univ UNESP, Dept Comp Sci & Stat DCCE, Salo Jose Do Rio Preto, Brazil
关键词
D O I
10.1088/1742-6596/633/1/012124
中图分类号
O1 [数学];
学科分类号
0701 ; 070101 ;
摘要
Intrusion Detection Systems (IDS) are traditionally divided into two types according to the detection methods they employ, namely (i) misuse detection and (ii) anomaly detection. Anomaly detection has been widely used and its main advantage is the ability to detect new attacks. However, the analysis of anomalies generated can become expensive, since they often have no clear information about the malicious events they represent. In this context, this paper presents a model for automated classification of alerts generated by an anomaly based IDS. The main goal is either the classification of the detected anomalies in well-defined taxonomies of attacks or to identify whether it is a false positive misclassified by the IDS. Some common attacks to computer networks were considered and we achieved important results that can equip security analysts with best resources for their analyses.
引用
收藏
页数:4
相关论文
共 50 条
  • [1] Anomaly detection enhanced classification in computer intrusion detection
    Fugate, M
    Gattiker, JR
    PATTERN RECOGNITION WITH SUPPORT VECTOR MACHINES, PROCEEDINGS, 2002, 2388 : 186 - 197
  • [2] An enhanced J48 classification algorithm for the anomaly intrusion detection systems
    Shadi Aljawarneh
    Muneer Bani Yassein
    Mohammed Aljundi
    Cluster Computing, 2019, 22 : 10549 - 10565
  • [3] An enhanced J48 classification algorithm for the anomaly intrusion detection systems
    Aljawarneh, Shadi
    Yassein, Muneer Bani
    Aljundi, Mohammed
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (Suppl 5): : 10549 - 10565
  • [4] Computer intrusion detection with classification and anomaly detection, using SVMs
    Fugate, M
    Gattiker, JR
    INTERNATIONAL JOURNAL OF PATTERN RECOGNITION AND ARTIFICIAL INTELLIGENCE, 2003, 17 (03) : 441 - 458
  • [5] Anomaly Based Intrusion Detection through Temporal Classification
    Ooi, Shih Yin
    Tan, Shing Chiang
    Cheah, Wooi Ping
    NEURAL INFORMATION PROCESSING, ICONIP 2014, PT III, 2014, 8836 : 612 - 619
  • [6] Panacea: Automating Attack Classification for Anomaly-Based Network Intrusion Detection Systems
    Bolzoni, Damiano
    Etalle, Sandro
    Hartel, Pieter H.
    RECENT ADVANCES IN INTRUSION DETECTION, PROCEEDINGS, 2009, 5758 : 1 - 20
  • [7] Building Multiclass Classification Baselines for Anomaly-based Network Intrusion Detection Systems
    Shah, Ajay
    Clachar, Sophine
    Minimair, Manfred
    Cook, Davis
    2020 IEEE 7TH INTERNATIONAL CONFERENCE ON DATA SCIENCE AND ADVANCED ANALYTICS (DSAA 2020), 2020, : 759 - 760
  • [8] Ensemble Model for Enhancing Classification Accuracy in Intrusion Detection Systems
    Nzuva, Silas Mutie
    Nderu, Lawrence
    Mwalili, Tobias
    INTERNATIONAL CONFERENCE ON ELECTRICAL, COMPUTER AND ENERGY TECHNOLOGIES (ICECET 2021), 2021, : 117 - 123
  • [9] Detection and classification of anomaly intrusion using hierarchy clustering and SVM
    Tang, Chenghua
    Xiang, Yang
    Wang, Yu
    Qian, Junyan
    Qiang, Baohua
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (16) : 3401 - 3411
  • [10] Anomaly intrusion detection systems based on evolutionary computing
    Srinoy, Surat
    Chimphlee, Siriporn
    Chimphlee, Witcha
    IMECS 2007: INTERNATIONAL MULTICONFERENCE OF ENGINEERS AND COMPUTER SCIENTISTS, VOLS I AND II, 2007, : 166 - +