A design of a parallel network anomaly detection algorithm based on classification

被引:1
|
作者
Ashok Kumar D. [1 ]
Venugopalan S.R. [2 ]
机构
[1] Department of Computer Science and Applications, Government Arts College, Kulithalai
[2] Aeronautical Development Agency, Ministry of Defence, Government of India, P. B. No. 1718, Vimanpura Post, Bangalore
关键词
Anomaly; Classification; Feature selection/weighting; Norm; Normalization; Parallel algorithm;
D O I
10.1007/s41870-019-00356-0
中图分类号
学科分类号
摘要
In the present digital age and with the huge volume of data floating around, the information security has become utmost importance. Intrusion detection is the process of analysing various events in a system/network for possible presence of intrusion. The aim of an intrusion detection system is to protect the system from unauthorized access. Design of intrusion detection systems (IDS) has gained lots of importance in the recent years and has become the standard component of in network security. Intrusion detection systems operate either using anomaly based or signature based and in some cases IDS operate in a hybrid way. The data growth rate and the higher bandwidth and network speed makes it very difficult to process the data in real-time. Many researchers have focused in this area and have used data mining techniques for detecting the intrusions. Classification is a data mining technique used to predict group membership for each data instance. Classification is being used by various researchers for detection intrusions. Lot of classification algorithms have been developed for intrusion detection with respective strengths and weaknesses. This paper presents a novel classification algorithm based on distance measure and Relief-F feature weighting. The performance measures of intrusion detection are compared with the commonly used classification algorithms such as Naïve Bayes, Decision Tree and Support Vector Machine (SVM) and the proposed algorithm outperforms the above mentioned algorithms in terms of Detection Rate, Accuracy, False Alarm Rate, F-Score and Mathews Correlation Coefficient. The proposed algorithm is tested using a benchmark dataset (KDDcup99 dataset) and a real traces dataset (Kyoto 2006 + dataset). This study also intend to compare the execution time for various classifiers and the parallel performance of NADA since NADA outperforms all the other classifiers in terms of serial execution time. The algorithm is parallelized and the results are presented in terms of execution time with various data size, speed up and efficiency. © 2019, Bharati Vidyapeeth's Institute of Computer Applications and Management.
引用
收藏
页码:2079 / 2092
页数:13
相关论文
共 50 条
  • [21] Industrial Control System Anomaly Detection and Classification Based on Network Traffic
    Jiang, Jehn-Ruey
    Chen, Yan-Ting
    IEEE ACCESS, 2022, 10 : 41874 - 41888
  • [22] Design of Anomaly Packet Detection Framework by Data Mining Algorithm for Network Flow
    Jakhale, A. R.
    2017 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE IN DATA SCIENCE (ICCIDS), 2017,
  • [23] Network anomaly detection based on TCM-KNN and genetic algorithm
    Li, Yang
    Fang, Bin-Xing
    Guo, Li
    Tian, Zhi-Hong
    Zhang, Yong-Zheng
    Jiang, Wei
    Tongxin Xuebao/Journal on Communications, 2007, 28 (12): : 48 - 52
  • [24] Research on anomaly detection algorithm based on generalization latency of telecommunication network
    Wang, Yan
    Wu, Zhensen
    Zhu, Yuanjian
    Zhang, Pei
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 85 : 9 - 18
  • [25] A Radio Anomaly Detection Algorithm Based on Modified Generative Adversarial Network
    Zhou, Xuanhan
    Xiong, Jun
    Zhang, Xiaochen
    Liu, Xiaoran
    Wei, Jibo
    IEEE WIRELESS COMMUNICATIONS LETTERS, 2021, 10 (07) : 1552 - 1556
  • [26] Network Anomaly Detection Algorithm Based on Deep Learning and Data Mining
    Li, Yiting
    PROCEEDINGS OF 2024 3RD INTERNATIONAL CONFERENCE ON CRYPTOGRAPHY, NETWORK SECURITY AND COMMUNICATION TECHNOLOGY, CNSCT 2024, 2024, : 220 - 225
  • [27] An Improved Parallel Network Traffic Anomaly Detection Method Based on Bagging and GRU
    Tao, Xiaoling
    Peng, Yang
    Zhao, Feng
    Wang, SuFang
    Liu, Ziyi
    WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, PT I, 2020, 12384 : 420 - 431
  • [28] Design of Campus Network Worm Detection System Based on Characteristic and Anomaly Detection
    Zhang, Xingang
    Wang, Baoping
    Cheng, Xindang
    Tian, Yan
    PROCEEDINGS OF 2011 INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND INDUSTRIAL ENGINEERING, 2011, : 57 - 60
  • [29] Research on Network Traffic Data Anomaly Identification and Detection Based on an Intrusion Detection Algorithm
    Zhang, Hui
    International Journal of Network Security, 2022, 24 (04) : 689 - 694
  • [30] Massively Parallel Anomaly Detection in Online Network Measurement
    Shanbhag, Shashank
    Wolf, Tilman
    2008 PROCEEDINGS OF 17TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS, VOLS 1 AND 2, 2008, : 261 - 266