Using QualityThreshold Distance to Detect Intrusion in TCP/IP Network

被引:0
|
作者
Gervais, Hatungimana [1 ]
Munif, Abdul [1 ]
Ahmad, Tohari [1 ]
机构
[1] Inst Teknol Sepuluh Nopember ITS, Dept Informat, Surabaya, Indonesia
关键词
clustering; information security; intrusion detection system; network-based IDS; network security;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
False positive rate is the main shortcoming for anomaly-based network intrusion detection systems. Many approaches have been proposed with dominating machine learning and artificial intelligence techniques or its combination. High false positive rate is due to being more general while designing detection model. Rule-based network intrusion detection systems lack high false positive rate if any, because rules are tighter to individually known type of attack. Although anomaly-based network intrusion detection systems do not need prior knowledge of attack, it is still possible to imitate some rule-based specificity at certain level while designing detection model in order to reduce the false positive rate. The specificity being handled in this paper is the design of network intrusion detection system for TCP/IP network traffic. Then we propose a method to prepare quality clusters to build a network intrusion detection model. It has been surveyed that some research did not bring contribution to network based intrusion detection systems due to improperly preprocessed data especially during feature selection. In this paper, we propose an attribute selection method with basic TCP network features only. By doing so, the experiment confirms the false positive rate (0.2%) and maintains overall system accuracy (99.6 %).
引用
收藏
页码:80 / 84
页数:5
相关论文
共 50 条
  • [21] Detection and classification of TCP/IP network services
    Tan, KMC
    Collie, BS
    13TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 1997, : 99 - 107
  • [22] Connecting sensor networks with TCP/IP network
    Lei, S
    Jin, W
    Hui, X
    Cho, JS
    Lee, S
    ADVANCED WEB AND NETWORK TECHNOLOGIES, AND APPLICATIONS, PROCEEDINGS, 2006, 3842 : 330 - 334
  • [23] TCP/IP performance over EGPRS network
    Sánchez, R
    Martinez, J
    Romero, J
    Järvelä, R
    IEEE 56TH VEHICULAR TECHNOLOGY CONFERENCE, VTC FALL 2002, VOLS 1-4, PROCEEDINGS, 2002, : 1120 - 1124
  • [24] Separated ethernet algorithm for intelligent building network integration using TCP/IP
    Chang, KB
    Shim, IJ
    Park, GT
    KNOWLEDGE-BASED INTELLIGENT INFORMATION AND ENGINEERING SYSTEMS, PT 1, PROCEEDINGS, 2005, 3681 : 452 - 458
  • [25] Estimation of the advanced TCP/IP algorithms for long distance collaboration
    Yamamoto, T.
    FUSION ENGINEERING AND DESIGN, 2008, 83 (2-3) : 516 - 519
  • [26] Delivery of medical multimedia contents through the TCP/IP network using RealSystem
    Suzuki, I
    Yamada, K
    Yamakawa, T
    Hashiba, M
    Akazawa, K
    COMPUTER METHODS AND PROGRAMS IN BIOMEDICINE, 2003, 70 (03) : 253 - 258
  • [28] Hybrid Approach to Detect Network Based Intrusion
    Rani, Sonam
    Jain, Sushma
    2018 FOURTH INTERNATIONAL CONFERENCE ON COMPUTING COMMUNICATION CONTROL AND AUTOMATION (ICCUBEA), 2018,
  • [29] An artificial intelligence membrane to detect network intrusion
    Okamoto T.
    Artificial Life and Robotics, 2011, 16 (1) : 44 - 47
  • [30] An Artificial Intelligence Membrane to Detect Network Intrusion
    Okamoto, Takeshi
    PROCEEDINGS OF THE SIXTEENTH INTERNATIONAL SYMPOSIUM ON ARTIFICIAL LIFE AND ROBOTICS (AROB 16TH '11), 2011, : 463 - 466