Active Learning Intrusion Detection using k-Means Clustering Selection

被引:0
|
作者
McElwee, Steven [1 ]
机构
[1] Nova Southeastern Univ, Coll Engn & Comp, Ft Lauderdale, FL 33314 USA
来源
关键词
machine learning; intrusion detection; random forest; active learning; k-means clustering; adversarial evasion; tampering; KDD-CUP; 99; NEURAL-NETWORKS;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Intrusion detection is an important method for identifying attacks and compromises of computer systems, but it is complicated by rapid changes in technology, the increasing interconnectedness of devices on the internet, the growing use of cyberattacks, and more sophisticated and automated attack methods and tools used by adversaries. The challenge of intrusion detection is further complicated because, as advances are made in the ability to detect attacks, similar advances are made by adversaries to thwart those detective measures. Although numerous machine learning algorithms and approaches have proven effective in detecting cyberattacks, these algorithms have limitations, especially in dealing with adversarial environments. This study addresses the problem that there is not an effective machine learning algorithm that minimizes human interaction to train and evolve the learner to adapt to changing cyberattacks and evasive tactics. This research concludes that selective sampling of unlabeled data for classification by a human expert can result in more efficient labeling for large datasets and demonstrates a more resilient approach to machine learning that utilizes active learning to interact with human subject matter experts and that adapts to changing data, thus addressing issues related to data tampering and evasion.
引用
收藏
页数:7
相关论文
共 50 条
  • [31] Failure Detection in Quadcopter UAVs Using K-Means Clustering
    Cabahug, James
    Eslamiat, Hossein
    [J]. SENSORS, 2022, 22 (16)
  • [32] Rain drop Detection and Removal using K-Means Clustering
    Kanthan, M. Ramesh
    Sujatha, S. Naganandini
    [J]. 2015 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMPUTING RESEARCH (ICCIC), 2015, : 811 - 815
  • [33] Network Intrusion Detection Using Improved Genetic k-means Algorithm
    Sukumar, Anand J., V
    Pranav, I
    Neetish, M. M.
    Narayanan, Jayasree
    [J]. 2018 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2018, : 2441 - 2446
  • [34] An accelerated K-means clustering algorithm using selection and erasure rules
    Lee, Suiang-Shyan
    Lin, Ja-Chen
    [J]. JOURNAL OF ZHEJIANG UNIVERSITY-SCIENCE C-COMPUTERS & ELECTRONICS, 2012, 13 (10): : 761 - 768
  • [35] An accelerated K-means clustering algorithm using selection and erasure rules
    Suiang-Shyan Lee
    Ja-Chen Lin
    [J]. Journal of Zhejiang University SCIENCE C, 2012, 13 : 761 - 768
  • [36] An accelerated K-means clustering algorithm using selection and erasure rules
    Suiang-Shyan LEE
    Ja-Chen LIN
    [J]. JournalofZhejiangUniversity-ScienceC(Computers&Electronics), 2012, 13 (10) : 761 - 768
  • [37] An accelerated K-means clustering algorithm using selection and erasure rules
    Suiang-Shyan LEE
    Ja-Chen LIN
    [J]. Frontiers of Information Technology & Electronic Engineering, 2012, (10) : 761 - 768
  • [38] Clones Clustering Using K-Means
    Ashish, Aveg
    [J]. PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS AND CONTROL (ISCO'16), 2016,
  • [39] Clones clustering using K-means
    Ashish, Aveg
    [J]. Proceedings of the 10th International Conference on Intelligent Systems and Control, ISCO 2016, 2016,
  • [40] Multipath Detection based on K-means Clustering
    Savas, Caner
    Dovis, Fabio
    [J]. PROCEEDINGS OF THE 32ND INTERNATIONAL TECHNICAL MEETING OF THE SATELLITE DIVISION OF THE INSTITUTE OF NAVIGATION (ION GNSS+ 2019), 2019, : 3801 - 3811