Using QualityThreshold Distance to Detect Intrusion in TCP/IP Network

被引:0
|
作者
Gervais, Hatungimana [1 ]
Munif, Abdul [1 ]
Ahmad, Tohari [1 ]
机构
[1] Inst Teknol Sepuluh Nopember ITS, Dept Informat, Surabaya, Indonesia
关键词
clustering; information security; intrusion detection system; network-based IDS; network security;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
False positive rate is the main shortcoming for anomaly-based network intrusion detection systems. Many approaches have been proposed with dominating machine learning and artificial intelligence techniques or its combination. High false positive rate is due to being more general while designing detection model. Rule-based network intrusion detection systems lack high false positive rate if any, because rules are tighter to individually known type of attack. Although anomaly-based network intrusion detection systems do not need prior knowledge of attack, it is still possible to imitate some rule-based specificity at certain level while designing detection model in order to reduce the false positive rate. The specificity being handled in this paper is the design of network intrusion detection system for TCP/IP network traffic. Then we propose a method to prepare quality clusters to build a network intrusion detection model. It has been surveyed that some research did not bring contribution to network based intrusion detection systems due to improperly preprocessed data especially during feature selection. In this paper, we propose an attribute selection method with basic TCP network features only. By doing so, the experiment confirms the false positive rate (0.2%) and maintains overall system accuracy (99.6 %).
引用
收藏
页码:80 / 84
页数:5
相关论文
共 50 条
  • [41] Network Coding Datagram Protocol for TCP/IP Networks
    Vladimirov, Sergey S. S.
    Vybornova, Anastasia
    Muthanna, Ammar
    Koucheryavy, Andrey
    Abd El-Latif, Ahmed A.
    IEEE ACCESS, 2023, 11 : 43485 - 43498
  • [42] The performance of TCP/IP over wireless ATM network
    Ogwu, F. J.
    Talib, M.
    Aderounmu, G. A.
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2007, 10 (05): : 707 - 720
  • [43] Investigation of statistics collection process in a TCP/IP network
    Broitman, MD
    Kalnberzin, AY
    AUTOMATIC CONTROL AND COMPUTER SCIENCES, 2002, 36 (01) : 44 - 50
  • [44] Design of ARM Based Data Acquisition & Control Using GSM & TCP/IP Network
    Patinge, Suraj
    Suryawanshi, Yogesh
    Kakde, Sandeep
    2013 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMPUTING RESEARCH (ICCIC), 2013, : 414 - 417
  • [45] State estimation for a TCP/IP network using terminal sliding-mode methodology
    Xu, Long
    Yu, Xinghuo
    Feng, Yong
    Han, Fengling
    Hu, Jiankun
    Tari, Zahir
    IECON 2017 - 43RD ANNUAL CONFERENCE OF THE IEEE INDUSTRIAL ELECTRONICS SOCIETY, 2017, : 6532 - 6536
  • [46] Behavior of competing TCP connections on a packet-switched ring: A study using the Harvard TCP/IP network simulator
    Kung, HT
    Wang, SY
    INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED PROCESSING TECHNIQUES AND APPLICATIONS, VOLS I-V, PROCEEDINGS, 1999, : 2143 - 2149
  • [47] IDS Based Network Security Architecture with TCP/IP Parameters using Machine Learning
    Ponmaniraj, S.
    Rashmi, R.
    Anand, M. Vivek
    2018 INTERNATIONAL CONFERENCE ON COMPUTING, POWER AND COMMUNICATION TECHNOLOGIES (GUCON), 2018, : 111 - 114
  • [48] Edge-Detect: Edge-centric Network Intrusion Detection using Deep Neural Network
    Singh, Praneet
    Jaykumar, Jishnu P.
    Pankaj, Akhil
    Mitra, Reshmi
    2021 IEEE 18TH ANNUAL CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE (CCNC), 2021,
  • [49] A detailed performance analysis of UDP/IP, TCP/IP, and M-VIA network protocols using Linux/SimOS
    Won, C
    Lee, B
    Yu, C
    Moh, S
    Park, K
    Kim, MJ
    JOURNAL OF HIGH SPEED NETWORKS, 2004, 13 (03) : 169 - 182
  • [50] Modified stacking ensemble approach to detect network intrusion
    Demir, Necati
    Dalkilic, Gokhan
    TURKISH JOURNAL OF ELECTRICAL ENGINEERING AND COMPUTER SCIENCES, 2018, 26 (01) : 418 - 433