A Gaussian Distribution-based Lightweight Intrusion Detection Model

被引:0
作者
Wang, Yuchen [1 ]
Xu, Shuxiang [2 ]
Liu, Wei [1 ]
Huang, Qiongfang [1 ]
机构
[1] Zhejiang Univ Technol, Coll Comp Sci & Technol, Hangzhou, Zhejiang, Peoples R China
[2] Univ Tasmania, Sch Comp & IS, Launceston, Tas, Australia
来源
INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY | 2015年 / 15卷 / 09期
关键词
intrusion detection; lightweight; Gaussian distribution filtering model; feature selection;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The important parts of building a lightweight intrusion detection model include selecting informative features and designing efficient classification process. In this paper, we propose a novel Gaussian distribution-based lightweight intrusion detection (GDLID) model, which combines a Gaussian distribution filtering model with a particular machine learning algorithm. Initially, feature selection with information gain is performed to find out the features with the most discriminative information, and 2 features are selected for our model. Then, we build a Gaussian distribution describing normal data and carry out a threshold selection algorithm to establish our Gaussian distribution filtering model which distinguishes outliers, uncertain data and normal data. Finally, we incorporate 5 well-known machine learning algorithms respectively into our model to classify the uncertain data. Experimental results show that our GD-LID model has very similar accuracy rate compared with using the 5 machine learning algorithms directly, but it can filter 43.05% of total network traffic data with only 2 features.
引用
收藏
页码:6 / 11
页数:6
相关论文
共 19 条
  • [1] Mutual information-based feature selection for intrusion detection systems
    Amiri, Fatemeh
    Yousefi, MohammadMahdi Rezaei
    Lucas, Caro
    Shakery, Azadeh
    Yazdani, Nasser
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2011, 34 (04) : 1184 - 1199
  • [2] Anderson JP, 1980, TECHNICAL REPORT
  • [3] Bajaj K, 2013, INT J COMPUTER SCI I, V10
  • [4] Blum A., 1998, Proceedings of the Eleventh Annual Conference on Computational Learning Theory, P92, DOI 10.1145/279943.279962
  • [5] Guyon I., 2003, Journal of Machine Learning Research, V3, P1157, DOI 10.1162/153244303322753616
  • [6] Hall M. A., 1999, CORRELATION BASED FE
  • [7] Unsupervised learning by probabilistic latent semantic analysis
    Hofmann, T
    [J]. MACHINE LEARNING, 2001, 42 (1-2) : 177 - 196
  • [8] Hosmer Jr D., 2004, APPL LOGISTIC REGRES
  • [9] JORDAN MI, 1992, COGNITIVE SCI, V16, P307, DOI 10.1207/s15516709cog1603_1
  • [10] Anomaly detection based on unsupervised niche clustering with application to network intrusion detection
    Leon, E
    Nasraoui, F
    Gomez, J
    [J]. CEC2004: PROCEEDINGS OF THE 2004 CONGRESS ON EVOLUTIONARY COMPUTATION, VOLS 1 AND 2, 2004, : 502 - 508