Hybrid Approach for Detection of Anomaly Network Traffic using Data Mining Techniques

被引:40
作者
Agarwal, Basant [1 ]
Mittal, Namita [1 ]
机构
[1] Malviya Natl Inst Technol Jaipur, Dept Comp Engn, Jaipur 302016, Rajasthan, India
来源
2ND INTERNATIONAL CONFERENCE ON COMMUNICATION, COMPUTING & SECURITY [ICCCS-2012] | 2012年 / 1卷
关键词
Anomaly detection; data mining; support vector machine;
D O I
10.1016/j.protcy.2012.10.121
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Anomaly based Intrusion Detection System (IDS) is getting popularity due to its adaptability to the changes in the behavior of network traffic as it has the ability to detect the new attacks. As it is very difficult to set any predefined rule for identifying correctly attack traffic since there is no major difference between normal and attack traffic. In this paper, Anomaly traffic detection system based on the Entropy of network features and Support Vector Machine (SVM) are compared. Further, a hybrid technique that is combination of both entropy of network features and support vector machine is compared with individual methods. DARPA Intrusion Detection Evaluation dataset is used in order to evaluate the methods. It is proved that entropy based detection technique is capable of identifying anomalies in network better than support vector machine based detection system. In addition, hybrid approach outperforms entropy and SVM based techniques. (C) 2012 The Authors. Published by Elsevier Ltd. Selection and/or peer-review under responsibility of the Department of Computer Science & Engineering, National Institute of Technology Rourkela
引用
收藏
页码:996 / 1003
页数:8
相关论文
共 17 条
[1]  
Altaher A, 2011, 2011 4TH IEEE INTERNATIONAL CONFERENCE ON BROADBAND NETWORK AND MULTIMEDIA TECHNOLOGY (4TH IEEE IC-BNMT2011), P33, DOI 10.1109/ICBNMT.2011.6155890
[2]  
[Anonymous], P INT MULT ENG COMP
[3]  
Chandola Varun, 2009, J ACM COMPUTING SURV, V41
[4]  
Chen RC, 2008, INT J INNOV COMPUT I, V4, P413
[5]   SUPPORT-VECTOR NETWORKS [J].
CORTES, C ;
VAPNIK, V .
MACHINE LEARNING, 1995, 20 (03) :273-297
[6]  
DARPA, 1999, DARPA INTR DET EV DA
[7]   AN INTRUSION-DETECTION MODEL [J].
DENNING, DE .
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 1987, 13 (02) :222-232
[8]   DDoS attack detection method using cluster analysis [J].
Lee, Keunsoo ;
Kim, Juhyun ;
Kwon, Ki Hoon ;
Han, Younggoo ;
Kim, Sehun .
EXPERT SYSTEMS WITH APPLICATIONS, 2008, 34 (03) :1659-1665
[9]   Information-theoretic measures for anomaly detection [J].
Lee, W ;
Xiang, D .
2001 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2001, :130-143
[10]  
Nychis G, 2008, IMC'08: PROCEEDINGS OF THE 2008 ACM SIGCOMM INTERNET MEASUREMENT CONFERENCE, P151