Assessing Centroid-Based Classification Models for Intrusion Detection System Using Composite Indicators

被引:4
作者
Setiawan, Bambang [1 ]
Djanali, Supeno [1 ]
Ahmad, Tohari [1 ]
Aziz, Moh Nasrul [1 ]
机构
[1] Inst Teknol Sepuluh Nopember, Dept Informat, Surabaya 60111, Indonesia
来源
FIFTH INFORMATION SYSTEMS INTERNATIONAL CONFERENCE | 2019年 / 161卷
关键词
Intrusion detection system; Centroid-based classification; Composite indicators; MACHINE; SELECTION;
D O I
10.1016/j.procs.2019.11.170
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Detecting intrusion in network traffic is one of the computer security problems that has received a lot of attention for years. Various intrusion detection models were developed by machine learning and data mining. Commonly, confusion matrix-based performance measures are used to compare the performance of several models. But sometimes we need to combine those measure or combine it with performance measures outside the confusion matrix. In this study, we propose two composite indicator indexes (CPI) which built based on composite indicators and weighted linear aggregation methods to evaluate the model's performance. The first CPI is a combination of accuracy, robustness, completeness, and speed. We use it to rank the performance of the three centroid-based classifications models (CANN, L-SCANN, CASMN) on NSL-KDD dataset. While the second is a combination of overall class accuracy and accuracy of each class, we use to compare the models with the other IDS models. (C) 2019 The Authors. Published by Elsevier B.V.
引用
收藏
页码:665 / 676
页数:12
相关论文
共 36 条
  • [1] Ahmad T., 2016, J. Telecommun. Inf. Technol., P71
  • [2] Multi-level hybrid support vector machine and extreme learning machine based on modified K-means for intrusion detection system
    Al-Yaseen, Wathiq Laftah
    Othman, Zulaiha Ali
    Nazri, Mohd Zakree Ahmad
    [J]. EXPERT SYSTEMS WITH APPLICATIONS, 2017, 67 : 296 - 303
  • [3] Anjum S, 2014, J EC BUS MANAG, V2, P62
  • [4] Anjum S., 2013, J IND INTELLIGENT IN, V1, P116
  • [5] [Anonymous], EUROPEAN J SCI RES
  • [6] [Anonymous], 1997, P 14 INT C ONMACHINE
  • [7] Modification of supervised OPF-based intrusion detection systems using unsupervised learning and social network concept
    Bostani, Hamid
    Sheikhan, Mansour
    [J]. PATTERN RECOGNITION, 2017, 62 : 56 - 72
  • [8] A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection
    Buczak, Anna L.
    Guven, Erhan
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2016, 18 (02): : 1153 - 1176
  • [9] Canadian-Institute, 2009, NSL KDD DAT
  • [10] Cardoso-Cachopo A, 2007, APPLIED COMPUTING 2007, VOL 1 AND 2, P844, DOI 10.1145/1244002.1244189