Enhancing Online Intrusion Detection Systems via Attack Clustering

被引:0
作者
Yavari, Sara [1 ]
Oteafy, Sharief [1 ]
机构
[1] Depaul Univ, Sch Comp, Chicago, IL 60604 USA
来源
IEEE CONFERENCE ON GLOBAL COMMUNICATIONS, GLOBECOM | 2023年
关键词
Intrusion Detection Systems; IDS; Ant Colony Algorithm; Feature Selection; Particle Swarm Optimization; Clustering;
D O I
10.1109/GLOBECOM54140.2023.10437054
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Improving Intrusion detection systems (IDS) is pivotal for securing networks from various elusive attacks, including DDoS, packet injection, and unauthorized access. While many IDS systems are successful in fending off attacks, they often suffer from either low accuracy or significant latency. This paper proposes an IDS framework that balances higher accuracy with computational complexity, focusing on decreasing dimensionality by utilizing clustering methods, along with Ant Colony Optimization, and Rough k-means algorithms. Additionally, the paper enhances existing feature selection algorithms through multi-objective optimization, eliminating superfluous features that do not contribute significantly to intrusion detection and reducing problem dimensions, which increases speed. The combination of rough clustering and optimization techniques leads to a desirable accuracy of 87% in low dimensions. The proposed framework is evaluated using two benchmark datasets, NSL-KDD and ISCX 2012, and compared to two leading approaches, namely ICA-BP and GA-BP, where our model surpassed their accuracy levels.
引用
收藏
页码:4650 / 4655
页数:6
相关论文
共 18 条
[1]  
Al-Gethami K., 2021, SEC COMM NETW
[2]  
Arvind T., 2020, INT J RES APPL SCI E
[3]  
Atli B. G., 2018, ARXIV180300530
[4]  
Chiba Z., 2019, COMP SEC
[5]   Avoiding Communication in Logistic Regression [J].
Devarakonda, Aditya ;
Demmel, James .
2020 IEEE 27TH INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING, DATA, AND ANALYTICS (HIPC 2020), 2020, :91-100
[6]  
Guezzaz A., 2021, SEC COMM NETW
[7]  
Kamarudin M. H., 2017, SECURITY COMMUNICATI, V2017
[8]  
Koay A, 2018, 2018 32ND INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN), P162, DOI 10.1109/ICOIN.2018.8343104
[9]   Design of an Evolutionary Approach for Intrusion Detection [J].
Kumar, Gulshan ;
Kumar, Krishan .
SCIENTIFIC WORLD JOURNAL, 2013,
[10]   TR-IDS: Anomaly-Based Intrusion Detection through Text-Convolutional Neural Network and Random Forest [J].
Min, Erxue ;
Long, Jun ;
Liu, Qiang ;
Cui, Jianjing ;
Chen, Wei .
SECURITY AND COMMUNICATION NETWORKS, 2018,