Clustering and Neural Visualization for Flow-Based Intrusion Detection

被引:0
作者
Sanchez, Raul [1 ]
Herrero, Alvaro [1 ]
Corchado, Emilio [2 ]
机构
[1] Univ Burgos, Dept Civil Engn, Burgos 09006, Spain
[2] Univ Salamanca, Dept Informat & Automat, E-37008 Salamanca, Spain
来源
INTERNATIONAL JOINT CONFERENCE: CISIS'15 AND ICEUTE'15 | 2015年 / 369卷
关键词
Network intrusion detection; Network flow; Neural projection; Clustering; IDS; ALGORITHM;
D O I
10.1007/978-3-319-19713-5_29
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
To secure a system, potential threats must be identified and therefore, attack features are understood and predicted. Present work aims at being one step towards the proposal of an Intrusion Detection System (IDS) that faces zero-day attacks. To do that, MObile VIsualisation Connectionist Agent-Based IDS (MOVICAB-IDS), previously proposed as a hybrid-intelligent visualization-based IDS, is being upgraded by adding clustering methods. To check the validity of the proposed clustering extension, it faces a realistic flow-based dataset in present paper. The analyzed data come from a honeypot directly connected to the Internet (thus ensuring attack-exposure) and is analyzed by clustering and neural tools, individually and in conjunction. Through the experimental stage, it is shown that the combination of clustering and neural projection improves the detection capability on a continuous network flow.
引用
收藏
页码:333 / 345
页数:13
相关论文
共 50 条
[31]   A-NIDS: Adaptive Network Intrusion Detection System Based on Clustering and Stacked CTGAN [J].
Zha, Chao ;
Wang, Zhiyu ;
Fan, Yifei ;
Bai, Bing ;
Zhang, Yinjie ;
Shi, Sainan ;
Zhang, Ruyun .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2025, 20 :3204-3219
[32]   MULTI-LEVEL FLOW-BASED MARKOV CLUSTERING FOR DESIGN STRUCTURE MATRICES [J].
Wilschut, Tim ;
Etman, Pascal ;
Rooda, Jacobus ;
Adan, Ivo .
PROCEEDINGS OF THE ASME INTERNATIONAL DESIGN ENGINEERING TECHNICAL CONFERENCES AND COMPUTERS AND INFORMATION IN ENGINEERING CONFERENCE, 2016, VOL 7, 2016,
[33]   ResACAG: A graph neural network based intrusion detection [J].
Zhang, Anqin ;
Zhao, Yan ;
Zhou, Chenhao ;
Zhang, Ting .
COMPUTERS & ELECTRICAL ENGINEERING, 2025, 122
[34]   Intrusion Detection Method Based on Improved Neural Network [J].
Tang Hai-he .
2018 INTERNATIONAL CONFERENCE ON SMART GRID AND ELECTRICAL AUTOMATION (ICSGEA), 2018, :151-154
[35]   An intrusion detection system based on convolution neural network [J].
Mo, Yanmeng ;
Li, Huige ;
Wang, Dongsheng ;
Liu, Gaqiong .
PEERJ COMPUTER SCIENCE, 2024, 10
[36]   An Adaptive Clustering Algorithm for Intrusion Detection [J].
QIU JuliNormal University of AnshanAnshanChina .
现代电子技术, 2007, (02) :130-132
[37]   A Fuzzy Clustering Approach for Intrusion Detection [J].
Zeng, QingPeng ;
Wu, ShuiXiu .
WISM: 2009 INTERNATIONAL CONFERENCE ON WEB INFORMATION SYSTEMS AND MINING, PROCEEDINGS, 2009, :728-+
[38]   Network traffic clustering for intrusion detection [J].
Arina, Nikishova ;
Irina, Ananina ;
Evgeny, Ananin .
PROCEEDINGS OF THE IV INTERNATIONAL RESEARCH CONFERENCE INFORMATION TECHNOLOGIES IN SCIENCE, MANAGEMENT, SOCIAL SPHERE AND MEDICINE (ITSMSSM 2017), 2017, 72 :252-256
[39]   A genetic clustering method for intrusion detection [J].
Liu, YG ;
Chen, KF ;
Liao, XF ;
Zhang, W .
PATTERN RECOGNITION, 2004, 37 (05) :927-942
[40]   An adaptive clustering algorithm for intrusion detection [J].
Wu, Guowei ;
Yao, Lin ;
Yao, Kai .
2006 IEEE INTERNATIONAL CONFERENCE ON INFORMATION ACQUISITION, VOLS 1 AND 2, CONFERENCE PROCEEDINGS, 2006, :1443-1447