Adaptive anomaly-based intrusion detection system using genetic algorithm and profiling

被引:37
作者
Alves Resende, Paulo Angelo [1 ]
Drummond, Andre Costa [1 ]
机构
[1] Univ Brasilia, Dept Comp Sci, Brasilia, DF, Brazil
关键词
adaptive intrusion detection systems; anomaly-based intrusion detection; apache spark; machine learning; profiling; projected clustering;
D O I
10.1002/spy2.36
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Intrusion detection systems have been playing an important role in defeating treats in the Cyberspace. In this context, researchers have been proposing anomaly-based methods for intrusion detection, on which the "normal" behavior is defined and the deviations (anomalies) are pointed out as intrusions. In this case, profiling is a relevant procedure used to establish a baseline for the normal behavior. In this work, an adaptive approach based on genetic algorithm is used to select features for profiling and parameters for anomaly-based intrusion detection methods. Additionally, two anomaly-based methods are introduced to be coupled with the proposed approach. One is based on basic statistics and the other is based on a projected clustering procedure. In the presented experiments performed on the CICIDS2017 dataset, our methods achieved results as good as detection rate equals to 92.85% and false positive rate of 0.69%. The presented approach iteratively adapts to new attacks and to the environmental requirements, such as security staff's preferences and available computational resources.
引用
收藏
页数:13
相关论文
共 46 条
[1]   Survey of approaches and features for the identification of HTTP-based botnet traffic [J].
Acarali, Dilara ;
Rajarajan, Muttukrishnan ;
Komninos, Nikos ;
Herwono, Ian .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 76 :1-15
[2]   A hybrid method consisting of GA and SVM for intrusion detection system [J].
Aslahi-Shahri, B. M. ;
Rahmani, R. ;
Chizari, M. ;
Maralani, A. ;
Eslami, M. ;
Golkar, M. J. ;
Ebrahimi, A. .
NEURAL COMPUTING & APPLICATIONS, 2016, 27 (06) :1669-1676
[3]   Comparison of classification techniques applied for network intrusion detection and classification [J].
Aziz, Amira Sayed A. ;
EL-Ola Hanafi, Sanaa ;
Hassanien, Aboul Ella .
JOURNAL OF APPLIED LOGIC, 2017, 24 :109-118
[4]   Intrusion detection through learning behavior model [J].
Balajinath, B ;
Raghavan, SV .
COMPUTER COMMUNICATIONS, 2001, 24 (12) :1202-1212
[5]   Network Anomaly Detection: Methods, Systems and Tools [J].
Bhuyan, Monowar H. ;
Bhattacharyya, D. K. ;
Kalita, J. K. .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2014, 16 (01) :303-336
[6]   Interval estimation for a binomial proportion - Comment - Rejoinder [J].
Brown, LD ;
Cai, TT ;
DasGupta, A ;
Agresti, A ;
Coull, BA ;
Casella, G ;
Corcoran, C ;
Mehta, C ;
Ghosh, M ;
Santner, TJ ;
Brown, LD ;
Cai, TT ;
DasGupta, A .
STATISTICAL SCIENCE, 2001, 16 (02) :101-133
[7]   An information-theoretic method for the detection of anomalies in network traffic [J].
Callegari, Christian ;
Giordano, Stefano ;
Pagano, Michele .
COMPUTERS & SECURITY, 2017, 70 :351-365
[8]   An autonomous labeling approach to support vector machines algorithms for network traffic anomaly detection [J].
Catania, Carlos A. ;
Bromberg, Facundo ;
Garcia Garino, Carlos .
EXPERT SYSTEMS WITH APPLICATIONS, 2012, 39 (02) :1822-1829
[9]  
Tran C, 2017, 2017 4TH NAFOSTED CONFERENCE ON INFORMATION AND COMPUTER SCIENCE (NICS), P156, DOI 10.1109/NAFOSTED.2017.8108056
[10]  
Chen ZM, 2016, 2016 THIRD INTERNATIONAL CONFERENCE ON DIGITAL INFORMATION PROCESSING, DATA MINING, AND WIRELESS COMMUNICATIONS (DIPDMWC), P176, DOI 10.1109/DIPDMWC.2016.7529385