Improving Intrusion Detection Using PCA And K-Means Clustering Algorithm

被引:2
作者
Khaoula, Radi [1 ]
Mohamed, Moughit [1 ]
机构
[1] Sultan Moulay Slimane Univ, LaSTI Lab, Natl Sch Appl Sci, Khouribga, Morocco
来源
2022 9TH INTERNATIONAL CONFERENCE ON WIRELESS NETWORKS AND MOBILE COMMUNICATIONS, WINCOM | 2022年
关键词
Intrusion Detection System; K-means; WEKA; Machine Learning; PCA; NSL-KDD dataset;
D O I
10.1109/WINCOM55661.2022.9966426
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In the last few years, the internet has been growing at an exponential rate, which has generated a severe increase in network attacks. So, to provide necessary security, an intrusion detection system (IDS) is used to detect malicious traffic and prevent attacks from various data sources. For this aim, clustering is the simple and reliable method in machine learning to detect intrusions in the case of unlabeled data, in addition to detecting unknown and new types of intrusions. In this paper, we are analyzing the NSL-KDD dataset, which is an improved version of its predecessor, the KDD-99 dataset, using the K-Means clustering algorithm. We compare the results by first using correlation as a feature selection method to eliminate redundant and irrelevant attributes in our data set, and then by increasing interpretability while minimizing information loss using the dimensionality reduction method of Principal Component Analysis (PCA). The analysis was done using Python and the data mining tool WEKA. Results are shown to have an improved accuracy after using PCA over K-means clustering. Our main objective is to provide a better model of IDS using machine learning, especially clustering methods.
引用
收藏
页码:19 / 23
页数:5
相关论文
共 50 条
  • [41] Microwave Nondestructive Testing for Defect Detection in Composites Based on K-Means Clustering Algorithm
    Shrifan, Nawaf H. M. M.
    Jawad, Ghassan Nihad
    Isa, Nor Ashidi Mat
    Akbar, Muhammad Firdaus
    IEEE ACCESS, 2021, 9 : 4820 - 4828
  • [42] DB-Kmeans:An Intrusion Detection Algorithm Based on DBSCAN and K-means
    Dong, Gangsong
    Jin, Yi
    Wang, Shiwen
    Li, Wencui
    Tao, Zhuo
    Guo, Shaoyong
    2019 20TH ASIA-PACIFIC NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM (APNOMS), 2019,
  • [43] Intrusion Detection System in Ad Hoc Networks with Neural Networks Artificial and K-Means Algorithm
    Canedo, D.
    Romariz, A.
    IEEE LATIN AMERICA TRANSACTIONS, 2019, 17 (07) : 1109 - 1115
  • [44] A K-means algorithm based on characteristics of density applied to network intrusion detection
    Xu, Jing
    Han, Dezhi
    Li, Kuan-Ching
    Jiang, Hai
    COMPUTER SCIENCE AND INFORMATION SYSTEMS, 2020, 17 (02) : 665 - 687
  • [45] Clustering Performance of an Evolutionary K-Means Algorithm
    Nigro, Libero
    Cicirelli, Franco
    Pupo, Francesco
    PROCEEDINGS OF NINTH INTERNATIONAL CONGRESS ON INFORMATION AND COMMUNICATION TECHNOLOGY, VOL 9, ICICT 2024, 2025, 1054 : 359 - 369
  • [46] An Improved Kernel K-means Clustering Algorithm
    Liu, Yang
    Yin, Hong Peng
    Chai, Yi
    PROCEEDINGS OF 2016 CHINESE INTELLIGENT SYSTEMS CONFERENCE, VOL I, 2016, 404 : 275 - 280
  • [47] FP-ANK: An Improvised Intrusion Detection System with Hybridization of Neural Network and K-Means Clustering over Feature Selection by PCA
    Biswas, Noor Ahmed
    Tammi, Wasima Matin
    Shah, Faisal Muhammad
    Chakraborty, Saikat
    2015 18TH INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY (ICCIT), 2015, : 317 - 322
  • [48] An Efficient Global K-means Clustering Algorithm
    Xie, Juanying
    Jiang, Shuai
    Xie, Weixin
    Gao, Xinbo
    JOURNAL OF COMPUTERS, 2011, 6 (02) : 271 - 279
  • [49] Clustering Algorithm Combining CPSO with K-Means
    Gu, Chunqin
    Tao, Qian
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON ADVANCES IN MECHANICAL ENGINEERING AND INDUSTRIAL INFORMATICS, 2015, 15 : 749 - 755
  • [50] Modified moving k-means clustering algorithm
    Alias, Mohd Fauzi
    Isa, Nor Ashidi Mat
    Sulaiman, Siti Amrah
    Mohamed, Mahaneem
    INTERNATIONAL JOURNAL OF KNOWLEDGE-BASED AND INTELLIGENT ENGINEERING SYSTEMS, 2012, 16 (02) : 79 - 86