ANOMALY-BASED INTRUSION DETECTION THROUGH K-MEANS CLUSTERING AND NAIVES BAYES CLASSIFICATION

被引:0
作者
Yassin, Warusia
Udzir, Nur Izura
Muda, Zaiton
Sulaiman, Md. Nasir
机构
来源
COMPUTING & INFORMATICS, 4TH INTERNATIONAL CONFERENCE, 2013 | 2013年
关键词
Intrusion Detection System; Anomaly-based Intrusion Detection; Machine Learning; Clustering; Classifier;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Intrusion detection systems (IDSs) effectively balance extra security appliance by identifying intrusive activities on a computer system, and their enhancement is emerging at an unexpected rate. Anomaly-based intrusion detection methods, which employ machine learning algorithms, are able to identify unforeseen attacks. Regrettably, the foremost challenge of this method is to minimize false alarm while maximizing detection and accuracy rate. We propose an integrated machine learning algorithm across K-Means clustering and Naive Bayes Classifier called KMC+NBC to overcome the aforesaid drawbacks. K-Means clustering is applied to labeling and gathers the entire data into corresponding cluster sets based on the data behavior, i.e., i.e. normal and attack, while Naive Bayes Classifier (NBC) is applied to reorder the misclassified clustered data into correct categories. Experiments have been performed to evaluate the performance of KMC+NBC and NBC against ISCX 2012 Intrusion Detection Evaluation Dataset. The result shows that KMC+NBC significantly improves the accuracy, detection rate up to 99% and 98.8%, respectively, while decreasing the false alarm to 2.2%.
引用
收藏
页码:298 / 303
页数:6
相关论文
共 50 条
  • [21] Anomaly-Based Intrusion Detection System Using Support Vector Machine
    Krishnaveni, S.
    Vigneshwar, Palani
    Kishore, S.
    Jothi, B.
    Sivamohan, S.
    ARTIFICIAL INTELLIGENCE AND EVOLUTIONARY COMPUTATIONS IN ENGINEERING SYSTEMS, 2020, 1056 : 723 - 731
  • [22] Anomaly-based intrusion detection system for IoT application
    Bhavsar M.
    Roy K.
    Kelly J.
    Olusola O.
    Discover Internet of Things, 2023, 3 (01):
  • [23] A multicriterion fuzzy classification method with greedy attribute selection for anomaly-based intrusion detection
    El-Alfy, El-Sayed M.
    Al-Obeidat, Feras N.
    9TH INTERNATIONAL CONFERENCE ON FUTURE NETWORKS AND COMMUNICATIONS (FNC'14) / THE 11TH INTERNATIONAL CONFERENCE ON MOBILE SYSTEMS AND PERVASIVE COMPUTING (MOBISPC'14) / AFFILIATED WORKSHOPS, 2014, 34 : 55 - 62
  • [24] Mahalanobis Distance Based K-Means Clustering
    Brown, Paul O.
    Chiang, Meng Ching
    Guo, Shiqing
    Jin, Yingzi
    Leung, Carson K.
    Murray, Evan L.
    Pazdor, Adam G. M.
    Cuzzocrea, Alfredo
    BIG DATA ANALYTICS AND KNOWLEDGE DISCOVERY, DAWAK 2022, 2022, 13428 : 256 - 262
  • [25] Network Intrusion Detection Models based on Naives Bayes and C4.5 Algorithms
    Mebawondu, Olamatanmi Josephine
    Popoola, Olugbemiga Solomon
    Ayogu, Ikechukwu Ignatius
    Ugwu, Chukwuemeka Christian
    Adetunmbi, Adebayo Olusola
    2022 IEEE NIGERIA 4TH INTERNATIONAL CONFERENCE ON DISRUPTIVE TECHNOLOGIES FOR SUSTAINABLE DEVELOPMENT (IEEE NIGERCON), 2022, : 450 - 454
  • [26] Anomaly-based network intrusion detection through assessing feature association impact scale
    Veeramreddy J.
    Vaddella R.P.V.
    International Journal of Information and Computer Security, 2016, 8 (03) : 241 - 257
  • [27] Improving K-Means Clustering Using Discretization Technique In Network Intrusion Detection System
    Tahir, Hatim Mohamad
    Said, Abas Md
    Osman, Nor Hayani
    Zakaria, Nur Haryani
    Sabri, Puteri Nurul 'Ain M.
    Katuk, Norliza
    2016 3RD INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCES (ICCOINS), 2016, : 248 - 252
  • [28] Anomaly-Based Intrusion Detection of Protocol-Aware Jamming
    Lichtman, Marc
    Reed, Jeffrey H.
    2015 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM 2015), 2015, : 269 - 274
  • [29] Optimal Thresholds for Anomaly-Based Intrusion Detection in Dynamical Environments
    Ghafouri, Amin
    Abbas, Waseem
    Laszka, Aron
    Vorobeychik, Yevgeniy
    Koutsoukos, Xenofon
    DECISION AND GAME THEORY FOR SECURITY, (GAMESEC 2016), 2016, 9996 : 415 - 434
  • [30] Anomaly-based Network Intrusion Detection using Ensemble Machine Learning Approach
    Das, Abhijit
    Pramod
    Sunitha, B. S.
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2022, 13 (02) : 635 - 645