Clustering and Neural Visualization for Flow-Based Intrusion Detection

被引:0
|
作者
Sanchez, Raul [1 ]
Herrero, Alvaro [1 ]
Corchado, Emilio [2 ]
机构
[1] Univ Burgos, Dept Civil Engn, Burgos 09006, Spain
[2] Univ Salamanca, Dept Informat & Automat, E-37008 Salamanca, Spain
来源
INTERNATIONAL JOINT CONFERENCE: CISIS'15 AND ICEUTE'15 | 2015年 / 369卷
关键词
Network intrusion detection; Network flow; Neural projection; Clustering; IDS; ALGORITHM;
D O I
10.1007/978-3-319-19713-5_29
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
To secure a system, potential threats must be identified and therefore, attack features are understood and predicted. Present work aims at being one step towards the proposal of an Intrusion Detection System (IDS) that faces zero-day attacks. To do that, MObile VIsualisation Connectionist Agent-Based IDS (MOVICAB-IDS), previously proposed as a hybrid-intelligent visualization-based IDS, is being upgraded by adding clustering methods. To check the validity of the proposed clustering extension, it faces a realistic flow-based dataset in present paper. The analyzed data come from a honeypot directly connected to the Internet (thus ensuring attack-exposure) and is analyzed by clustering and neural tools, individually and in conjunction. Through the experimental stage, it is shown that the combination of clustering and neural projection improves the detection capability on a continuous network flow.
引用
收藏
页码:333 / 345
页数:13
相关论文
共 50 条
  • [1] Flow-Based Intrusion Detection Systems: A Survey
    Al-Bakaa, Aliaa
    Al-Musawi, Bahaa
    APPLICATIONS AND TECHNIQUES IN INFORMATION SECURITY (ATIS 2021), 2022, 1554 : 121 - 137
  • [2] Flow-based intrusion detection: Techniques and challenges
    Umer, Muhammad Fahad
    Sher, Muhammad
    Bi, Yaxin
    COMPUTERS & SECURITY, 2017, 70 : 238 - 254
  • [3] An Overview of IP Flow-Based Intrusion Detection
    Sperotto, Anna
    Schaffrath, Gregor
    Sadre, Ramin
    Morariu, Cristian
    Pras, Aiko
    Stiller, Burkhard
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2010, 12 (03): : 343 - 356
  • [4] Analyzing Flow-based Anomaly Intrusion Detection using Replicator Neural Networks
    Cordero, Carlos Garcia
    Hauke, Sascha
    Muhlhauser, Max
    Fischert, Mathias
    2016 14TH ANNUAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2016,
  • [5] Flow-Based Intrusion Detection System for SDN
    Ajaeiya, Georgi A.
    Adalian, Nareg
    Elhajj, Imad H.
    Kayssi, Ayman
    Chehab, Ali
    2017 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (ISCC), 2017, : 787 - 793
  • [6] Flow-Based Rip Current Detection and Visualization
    Mori, Issei
    de Silva, Akila
    Dusek, Gregory
    Davis, James
    Pang, Alex
    IEEE ACCESS, 2022, 10 : 6483 - 6495
  • [7] Flow-Based Rip Current Detection and Visualization
    Mori, Issei
    De Silva, Akila
    Dusek, Gregory
    Davis, James
    Pang, Alex
    IEEE Access, 2022, 10 : 6483 - 6495
  • [8] Flow-Based Anomaly Intrusion Detection System Using Two Neural Network Stages
    Abuadlla, Yousef
    Kvascev, Goran
    Gajin, Slavko
    Jovanovic, Zoran
    COMPUTER SCIENCE AND INFORMATION SYSTEMS, 2014, 11 (02) : 601 - 622
  • [9] SSHCure: A Flow-Based SSH Intrusion Detection System
    Hellemons, Laurens
    Hendriks, Luuk
    Hofstede, Rick
    Sperotto, Anna
    Sadre, Ramin
    Pras, Aiko
    DEPENDABLE NETWORKS AND SERVICES, 2012, 7279 : 86 - 97
  • [10] A Labeled Data Set for Flow-Based Intrusion Detection
    Sperotto, Anna
    Sadre, Ramin
    van Vliet, Frank
    Pras, Aiko
    IP OPERATIONS AND MANAGEMENT, PROCEEDINGS, 2009, 5843 : 39 - 50