Application of Data Mining to Network Intrusion Detection: Classifier Selection Model

被引:0
作者
Nguyen, Huy Anh [1 ]
Choi, Deokjai [1 ]
机构
[1] Chonnam Natl Univ, Dept Comp Sci, Kwangju 500757, South Korea
来源
CHALLENGES FOR NEXT GENERATION NETWORK OPERATIONS AND SERVICE MANAGEMENT, PROCEEDINGS | 2008年 / 5297卷
关键词
Data mining; Machine learning; Classifier; Network security; Intrusion detection; Algorithm selection; KDD dataset;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
As network attacks have increased in number and severity over the past few years, intrusion detection system (IDS) is increasingly becoming a critical component to secure the network. Due to large volumes of security audit data as well as complex and dynamic properties of intrusion behaviors, optimizing performance of IDS becomes an important open problem that is receiving more and more attention from the research community. The uncertainty to explore if certain algorithms perform better for certain attack classes constitutes the motivation for the reported herein. In this paper, we evaluate performance of a comprehensive set of classifier algorithms using KDD99 dataset. Based on evaluation results, best algorithms for each attack category is chosen and two classifier algorithm selection models are proposed. The simulation result comparison indicates that noticeable performance improvement and real-time intrusion detection can be achieved as we apply the proposed models to detect different kinds of network attacks.
引用
收藏
页码:399 / 408
页数:10
相关论文
共 13 条
[1]  
Agarwal R., 2000, PNRULE NEW FRAMEWORK
[2]  
Aksoy S., 2008, K NEAREST NEIGHBOR C
[3]  
[Anonymous], 2005, Data Mining Pratical Machine Learning Tools and Techniques
[4]  
[Anonymous], WEKA DATA MINING MAC
[5]  
[Anonymous], KDD CUP 1999 DAT
[6]  
[Anonymous], 1996, P 2 INT C KNOWLEDGE
[7]  
John G., 1995, UAI 95 P 11 C UNC AR
[8]  
LI Y, 2007, 26 COMPUTERS SECURIT, P459
[9]  
Quinlan J. R., 2014, C4 5 PROGRAMS MACHIN
[10]  
Sabhnani Maheshkumar, 2004, INTELLIGENT DATA ANA, V6