Large-scale network intrusion detection algorithm based on distributed learning

被引:4
作者
College of Computer Science and Technology, Jilin University, Changchun 130012, China [1 ]
不详 [2 ]
机构
[1] College of Computer Science and Technology, Jilin University
[2] Key Laboratory of Symbolic Computation and Knowledge Engineering, Jilin University
来源
Ruan Jian Xue Bao/Journal of Software | 2008年 / 19卷 / 04期
关键词
Distributed learning; Intrusion detection system; Network behavior; Neural network;
D O I
10.3724/SP.J.1001.2008.00993
中图分类号
学科分类号
摘要
As Internet bandwidth is increasing at an exponential rate, it's impossible to keep up with the speed of networks by just increasing the speed of processors. In addition, those complex intrusion detection methods also further add to the pressure on network intrusion detection system (NIDS) platforms, and then the continuous increasing speed and throughput of network pose new challenges to NIDS. In order to make NIDS effective in Gigabit Ethernet, the ideal policy is to use a load balancer to split the traffic and forward them to different detection sensors, and these sensors can analyze the splitting data in parallel. If the load balancer is required to make each slice containing all the necessary evidence to detect a specific attack, it has to be designed complicatedly and becomes a new bottleneck of NIDS. To simplify the load balancer, this paper puts forward a distributed neural network learning algorithm. By using the learning algorithm, a large data set can be split randomly and each slice data is handled by an independent neural network in parallel. The first experiment tests the algorithm's learning ability on the benchmark of circle-in-the-square and compares it with ARTMAP (adaptive resonance theory supervised predictive mapping) and BP (back propagation) neural network; the second experiment is performed on the KDD'99 Data Set which is a standard intrusion detection benchmark. Comparisons with other approaches on the same benchmark show that it can perform detection at a high detection speed and low false alarm rate.
引用
收藏
页码:993 / 1003
页数:10
相关论文
共 27 条
  • [1] Song H., Lockwood J.W., Efficient packet classification for network intrusion detection using FPGA, Proc. of the 13th Int'l Symp. on Field-Programmable Gate Arrays, pp. 238-245, (2005)
  • [2] Baker Z.K., Prasanna V.K., A methodology for synthesis of efficient intrusion detection systems on FPGAs, Proc. of the 12th Annual IEEE Symp. on Field-Programmable Custom Computing Machines, pp. 135-144, (2004)
  • [3] Tian D.X., Liu Y.H., Li Y.L., Tang Y., Fast matching algorithm and conflict detection for packet filter rules, Journal of Computer Research and Development, 42, 7, pp. 1128-1135, (2005)
  • [4] Tuck N., Sherwood T., Calder B., Varghese G., Deterministic memory-efficient string matching algorithms for intrusion detection, Proc. of the 23rd Conf. of the IEEE Communications Society, pp. 2628-2639, (2004)
  • [5] Tan L., Sherwood T., A high throughput string matching architecture for intrusion detection and prevention, Proc. of the 32nd Int'l Symp. on Computer Architecture, pp. 112-122, (2005)
  • [6] Mukkamala S., Sung A.H., Abraham A., Intrusion detection using an ensemble of intelligent paradigms, Journal of Network and Computer Applications, 28, 2, pp. 167-182, (2005)
  • [7] Lee H., Chung Y., Park D., An adaptive intrusion detection algorithm based on clustering and kernel-method, Proc. of the 10th Pacific-Asia Conf. on Knowledge Discovery and Data Mining, pp. 603-610, (2006)
  • [8] Xu X., Wang X., An adaptive network intrusion detection method based on PCA and support vector machines, Proc. of the 1st Int'l Conf. on Advanced Data Mining and Applications, pp. 696-703, (2005)
  • [9] Aggarwal C.C., Yu P.S., An effective and efficient algorithm for high-dimensional outlier detection, The Int'l Journal on Very Large Data Bases, 14, 2, pp. 211-221, (2005)
  • [10] Rawat S., Pujari A.K., Gulati V.P., On the use of singular value decomposition for a fast intrusion detection system, Electronic Notes in Theoretical Computer Science, 142, 3, pp. 215-228, (2006)