Multi-Agent Intrusion Detection System Using Feature Selection Approach

被引:14
作者
Gong, Yi [1 ]
Fang, Yong [1 ]
Liu, Liang [1 ]
Li, Juan [2 ]
机构
[1] Sichuan Univ, Dept Elect & Informat Engn, Chengdu 610064, Peoples R China
[2] Informat Technol Secur Evaluat Ctr China, Beijing, Peoples R China
来源
2014 TENTH INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING (IIH-MSP 2014) | 2014年
关键词
intrusion detection system; multi-agent; feature selection; industrial control system;
D O I
10.1109/IIH-MSP.2014.137
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Due to the increased connectivity to Internet and corporate network, industrial control system (ICS) is no longer immune to network attacks. Most of these ICSs are not designed with security protection nowadays, so there is an increasing demand of designing protection mechanism in infrastructure of industrial plants. In this paper, we propose multi-agent intrusion detection architecture and a feature selection approach to protect ICS. Multi-agent intrusion detection system (MIDS) architecture is designed for decentralized intrusion detection and prevention control in large switched networks, so it can make intrusion detection system (IDS) efficient and scalable, while the feature detection approach is proposed to improve detection reliability. We chose NSL-KDD as experimental data and had a test on four kinds of attacks (Probe, Dos, U2R and R2L) to evaluate the performance of IDS. Compared with four other common feature selection algorithms (IG, GR, ReliefF and ChiSquare), the experimental results show that our method can effectively improve True Positive Rate and reduce False Positive Rate of IDS.
引用
收藏
页码:528 / 531
页数:4
相关论文
共 12 条
[1]  
[Anonymous], P 9 INT WORKSH MACH
[2]  
[Anonymous], 2014, C4. 5: programs for machine learning
[3]  
[Anonymous], 2004, Mach. Learn.
[4]  
Chae HeeSu., 2013, RECENT ADV COMPUTER, P184
[5]  
Fengli Zhang, 2013, 2013 IEEE Eighth International Conference on Networking, Architecture and Storage (NAS), P307, DOI 10.1109/NAS.2013.49
[6]   The Design of ICS Testbed Based on Emulation,Physical,and Simulation(EPS-ICS Testbed) [J].
Gao, Haihui ;
Peng, Yong ;
Dai, Zhonghua ;
Wang, Ting ;
Jia, Kebin .
2013 NINTH INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING (IIH-MSP 2013), 2013, :420-423
[7]  
Liu H, 1995, PROC INT C TOOLS ART, P388, DOI 10.1109/TAI.1995.479783
[8]  
McHugh J., 2000, ACM Transactions on Information and Systems Security, V3, P262, DOI 10.1145/382912.382923
[9]  
Tavallaee M., 2009, IEEE S COMP INT SEC, DOI [10.1109/CISDA.2009.5356528, DOI 10.1109/CISDA.2009.5356528]
[10]  
Tsang CH, 2005, 2005 IEEE International Conference on Industrial Technology - (ICIT), Vols 1 and 2, P115