A design of a parallel network anomaly detection algorithm based on classification

被引:1
|
作者
Ashok Kumar D. [1 ]
Venugopalan S.R. [2 ]
机构
[1] Department of Computer Science and Applications, Government Arts College, Kulithalai
[2] Aeronautical Development Agency, Ministry of Defence, Government of India, P. B. No. 1718, Vimanpura Post, Bangalore
关键词
Anomaly; Classification; Feature selection/weighting; Norm; Normalization; Parallel algorithm;
D O I
10.1007/s41870-019-00356-0
中图分类号
学科分类号
摘要
In the present digital age and with the huge volume of data floating around, the information security has become utmost importance. Intrusion detection is the process of analysing various events in a system/network for possible presence of intrusion. The aim of an intrusion detection system is to protect the system from unauthorized access. Design of intrusion detection systems (IDS) has gained lots of importance in the recent years and has become the standard component of in network security. Intrusion detection systems operate either using anomaly based or signature based and in some cases IDS operate in a hybrid way. The data growth rate and the higher bandwidth and network speed makes it very difficult to process the data in real-time. Many researchers have focused in this area and have used data mining techniques for detecting the intrusions. Classification is a data mining technique used to predict group membership for each data instance. Classification is being used by various researchers for detection intrusions. Lot of classification algorithms have been developed for intrusion detection with respective strengths and weaknesses. This paper presents a novel classification algorithm based on distance measure and Relief-F feature weighting. The performance measures of intrusion detection are compared with the commonly used classification algorithms such as Naïve Bayes, Decision Tree and Support Vector Machine (SVM) and the proposed algorithm outperforms the above mentioned algorithms in terms of Detection Rate, Accuracy, False Alarm Rate, F-Score and Mathews Correlation Coefficient. The proposed algorithm is tested using a benchmark dataset (KDDcup99 dataset) and a real traces dataset (Kyoto 2006 + dataset). This study also intend to compare the execution time for various classifiers and the parallel performance of NADA since NADA outperforms all the other classifiers in terms of serial execution time. The algorithm is parallelized and the results are presented in terms of execution time with various data size, speed up and efficiency. © 2019, Bharati Vidyapeeth's Institute of Computer Applications and Management.
引用
收藏
页码:2079 / 2092
页数:13
相关论文
共 50 条
  • [41] Performance Analysis of Classification Models for Network Anomaly Detection
    Derweesh, Maythem S.
    Alazawi, Sundos A. Hameed
    Al-Saleh, Anwar H.
    FORTHCOMING NETWORKS AND SUSTAINABILITY IN THE AIOT ERA, VOL 2, FONES-AIOT 2024, 2024, 1036 : 155 - 166
  • [42] Network Anomaly Detection and Classification via Opportunistic Sampling
    Androulidakis, Georgios
    Chatzigiannakis, Vassilis
    Papavassiliou, Symeon
    IEEE NETWORK, 2009, 23 (01): : 6 - 12
  • [43] Network anomaly detection using Deep Autoencoder and parallel Artificial Bee Colony algorithm-trained neural network
    Hacılar, Hilal
    Dedeturk, Bilge Kagan
    Bakir-Gungor, Burcu
    Gungor, Vehbi Cagri
    PeerJ Computer Science, 2024, 10
  • [44] Network anomaly detection using Deep Autoencoder and parallel Artificial Bee Colony algorithm-trained neural network
    Hacilar, Hilal
    Dedeturk, Bilge Kagan
    Bakir-Gungor, Burcu
    Gungor, Vehbi Cagri
    PEERJ COMPUTER SCIENCE, 2024, 10
  • [45] Anomaly Detection Algorithm Based on CFSFDP
    Ren, Weiwu
    Zhang, Jianfei
    Di, Xiaoqiang
    Lu, Yinan
    Zhang, Bochen
    Zhao, Jianping
    JOURNAL OF ADVANCED COMPUTATIONAL INTELLIGENCE AND INTELLIGENT INFORMATICS, 2020, 24 (04) : 453 - 460
  • [46] Anomaly Network Intrusion Detection Based on Improved Self Adaptive Bayesian Algorithm
    Farid, Dewan Md.
    Rahman, Mohammad Zahidur
    JOURNAL OF COMPUTERS, 2010, 5 (01) : 23 - 31
  • [47] Computer Network Intrusion Anomaly Detection Based on Rough Fourier Fast Algorithm
    Duan, Xindong
    MATHEMATICAL PROBLEMS IN ENGINEERING, 2022, 2022
  • [48] Network Anomaly Traffic Detection Algorithm Based on RIC-SC-DeCN
    Gong, Xingyu
    Cao, Ke
    Li, Na
    Jia, Pengtao
    COMPUTATIONAL INTELLIGENCE AND NEUROSCIENCE, 2022, 2022
  • [49] Network Anomaly Traffic Detection Algorithm Based on RIC-SC-DeCN
    Gong, Xingyu
    Cao, Ke
    Li, Na
    Jia, Pengtao
    COMPUTATIONAL INTELLIGENCE AND NEUROSCIENCE, 2022, 2022
  • [50] Hadoop Based Parallel Binary Bat Algorithm for Network Intrusion Detection
    P. Natesan
    R. R. Rajalaxmi
    G. Gowrison
    P. Balasubramanie
    International Journal of Parallel Programming, 2017, 45 : 1194 - 1213