Using QualityThreshold Distance to Detect Intrusion in TCP/IP Network

被引:0
|
作者
Gervais, Hatungimana [1 ]
Munif, Abdul [1 ]
Ahmad, Tohari [1 ]
机构
[1] Inst Teknol Sepuluh Nopember ITS, Dept Informat, Surabaya, Indonesia
关键词
clustering; information security; intrusion detection system; network-based IDS; network security;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
False positive rate is the main shortcoming for anomaly-based network intrusion detection systems. Many approaches have been proposed with dominating machine learning and artificial intelligence techniques or its combination. High false positive rate is due to being more general while designing detection model. Rule-based network intrusion detection systems lack high false positive rate if any, because rules are tighter to individually known type of attack. Although anomaly-based network intrusion detection systems do not need prior knowledge of attack, it is still possible to imitate some rule-based specificity at certain level while designing detection model in order to reduce the false positive rate. The specificity being handled in this paper is the design of network intrusion detection system for TCP/IP network traffic. Then we propose a method to prepare quality clusters to build a network intrusion detection model. It has been surveyed that some research did not bring contribution to network based intrusion detection systems due to improperly preprocessed data especially during feature selection. In this paper, we propose an attribute selection method with basic TCP network features only. By doing so, the experiment confirms the false positive rate (0.2%) and maintains overall system accuracy (99.6 %).
引用
收藏
页码:80 / 84
页数:5
相关论文
共 50 条
  • [31] Comparing Unsupervised Learning Approaches to Detect Network Intrusion Using NetFlow Data
    Zhang, Julina
    Jones, Kerry
    Song, Tianye
    Kang, Hyojung
    Brown, Donald E.
    2017 SYSTEMS AND INFORMATION ENGINEERING DESIGN SYMPOSIUM (SIEDS), 2017, : 122 - 127
  • [32] Real-time image transmission on the TCP/IP network using wavelet transform and neural network
    Kim, JH
    Kim, HB
    Nam, BH
    PROCEEDINGS OF THE INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS 2003, VOLS 1-4, 2003, : 1213 - 1218
  • [33] Research on TCP/IP network accounting based on Linux
    Yang, Guocai
    Xu, Jian
    Liu, Binggang
    Xiaoxing Weixing Jisuanji Xitong/Mini-Micro Systems, 2000, 21 (07): : 782 - 784
  • [34] Network management of TCP/IP networks: Present and future
    Ben-Artzi, Amatzia
    Chandna, Asheem
    Warrier, Unni
    IEEE Network, 1990, 4 (04): : 35 - 43
  • [35] Network management of TCP/IP-based SNMP
    Yao, Jianing
    Chongqing Jianzhu Daxue Xuebao/Journal of Chongqing Jianzhu University, 2000, 22 (01): : 33 - 38
  • [36] Performance of TCP on mobile IP network during handoffs
    Mohamed, Y
    Fisal, N
    Mohd, A
    2002 STUDENT CONFERENCE ON RESEARCH AND DEVELOPMENT, PROCEEDINGS: GLOBALIZING RESEARCH AND DEVELOPMENT IN ELECTRICAL AND ELECTRONICS ENGINEERING, 2002, : 390 - 393
  • [37] Protocols and architecture for managing TCP/IP network infrastructures
    King, A
    Hunt, R
    COMPUTER COMMUNICATIONS, 2000, 23 (16) : 1558 - 1572
  • [38] TCP/IP performance and behavior over an ATM network
    Li, YJ
    Elby, S
    IEEE GLOBECOM 1996 - GLOBAL INTERNET'96, CONFERENCE RECORD: COMMUNICATIONS: THE KEY TO GLOBAL PROSPERITY, 1996, : 1 - 9
  • [39] UNIX, SQL, AND TCP/IP - NETWORK, DOES WORK
    COX, T
    ANDREW SEYBOLDS OUTLOOK ON PROFESSIONAL COMPUTING, 1989, 7 (09): : 9 - 10
  • [40] Admission control for TCP connections in QoS IP network
    Burakowski, W
    Tarasiuk, H
    WEB AND COMMUNICATION TECHNOLOGIES AND INTERNET-RELATED SOCIAL ISSUES - HSI 2003, 2003, 2713 : 383 - 393