Using QualityThreshold Distance to Detect Intrusion in TCP/IP Network

被引:0
|
作者
Gervais, Hatungimana [1 ]
Munif, Abdul [1 ]
Ahmad, Tohari [1 ]
机构
[1] Inst Teknol Sepuluh Nopember ITS, Dept Informat, Surabaya, Indonesia
关键词
clustering; information security; intrusion detection system; network-based IDS; network security;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
False positive rate is the main shortcoming for anomaly-based network intrusion detection systems. Many approaches have been proposed with dominating machine learning and artificial intelligence techniques or its combination. High false positive rate is due to being more general while designing detection model. Rule-based network intrusion detection systems lack high false positive rate if any, because rules are tighter to individually known type of attack. Although anomaly-based network intrusion detection systems do not need prior knowledge of attack, it is still possible to imitate some rule-based specificity at certain level while designing detection model in order to reduce the false positive rate. The specificity being handled in this paper is the design of network intrusion detection system for TCP/IP network traffic. Then we propose a method to prepare quality clusters to build a network intrusion detection model. It has been surveyed that some research did not bring contribution to network based intrusion detection systems due to improperly preprocessed data especially during feature selection. In this paper, we propose an attribute selection method with basic TCP network features only. By doing so, the experiment confirms the false positive rate (0.2%) and maintains overall system accuracy (99.6 %).
引用
收藏
页码:80 / 84
页数:5
相关论文
共 50 条
  • [1] Mining TCP/IP packets to detect stepping-stone intrusion
    Yang, Jianhua
    Huang, Shou-Hsuan Stephen
    COMPUTERS & SECURITY, 2007, 26 (7-8) : 479 - 484
  • [2] Matching TCP/IP Packets to Detect Stepping-Stone Intrusion
    Yang, Jianhua
    Huang, Shou-Hsuan Stephen
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2006, 6 (10): : 269 - 276
  • [3] TCP/IP Reassembly in Network Intrusion Detection and Prevention Systems
    Wang, Xiaojun
    Cronin, Brendan
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2014, 8 (03) : 63 - 76
  • [4] Correlating TCP/IP Packet contexts to detect stepping-stone intrusion
    Yang, Jianhua
    Woolbright, David
    COMPUTERS & SECURITY, 2011, 30 (6-7) : 538 - 546
  • [5] Mining TCP/IP traffic for network intrusion detection by using a distributed Genetic Algorithm
    Neri, F
    MACHINE LEARNING: ECML 2000, 2000, 1810 : 313 - 322
  • [6] Evolutive modeling of TCP/IP network traffic for intrusion detection
    Neri, F
    REAL-WORLD APPLICATIONS OF EVOLUTIONARY COMPUTING, PROCEEDINGS, 2000, 1803 : 214 - 223
  • [7] Correlating TCP/IP Interactive Sessions with Correlation Coefficient to Detect Stepping-Stone Intrusion
    Zhao, Guoqing
    Yang, Jianhua
    Hura, Gurdeep S.
    Ni, Long
    Huang, Shou-Hsuan Stephen
    2009 INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, 2009, : 546 - +
  • [8] TCP/IP Model and Intrusion Detection Systems
    Zaman, Safaa
    Karray, Fakhri
    2009 INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS: WAINA, VOLS 1 AND 2, 2009, : 90 - 96
  • [9] TCP/IP Feature Reduction in Intrusion Detection
    LIU Yuling
    WuhanUniversityJournalofNaturalSciences, 2007, (01) : 151 - 154
  • [10] An approach to detect TCP/IP based attack
    Ugtakhbayar, N.
    Usukhbayar, B.
    Nyamjav, J.
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2016, 16 (04): : 37 - 40