Using clustering to improve the KNN-based classifiers for online anomaly network traffic identification

被引:73
作者
Su, Ming-Yang [1 ]
机构
[1] Ming Chuan Univ, Dept Comp Sci & Informat Engn, Tao Yuan 333, Taiwan
关键词
Online anomaly detection; Flooding attacks; DoS (Denial-of-Service) attacks; Genetic algorithm; KNN (K-nearest-neighbor) classification; Unsupervised clustering; INTRUSION DETECTION;
D O I
10.1016/j.jnca.2010.10.009
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
This paper proposes a method to identify flooding attacks in real-time, based on anomaly detection by genetic weighted KNN (K-nearest-neighbor) classifiers. A genetic algorithm is used to train an optimal weight vector for features; meanwhile, an unsupervised clustering algorithm is applied to reduce the number of instances in the sampling dataset, in order to shorten training and execution time, as well as to promote the system's overall accuracy. More precisely, instances in the sampling dataset are replaced by less, but more significant, centroids of clusters. According to the proposed method, a system is implemented and evaluated by numerous Denial-of-Service (DoS) attacks. With an embedded weighted KNN classifier, the proposed system could identify a DoS attack from network traffic within a very short time; moreover, the experimental results show that the proposed system could achieve 95.8654% in overall accuracy in the case of 2-fold cross-validation, and 96.25% in overall accuracy for all known attack evaluations. That is, the proposed system possesses both effectiveness and efficiency. Effectiveness is measured by overall accuracy, including detection rate and false alarm rate, and efficiency is measured by the response time during an attack. (C) 2010 Elsevier Ltd. All rights reserved.
引用
收藏
页码:722 / 730
页数:9
相关论文
共 19 条
[1]   Protocol analysis in intrusion detection using decision tree [J].
Abbes, T ;
Boulloula, A ;
Rusinowitch, M .
ITCC 2004: INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: CODING AND COMPUTING, VOL 1, PROCEEDINGS, 2004, :404-408
[2]  
[Anonymous], 2003, Snort 2.0 Intrusion Detection
[3]  
[Anonymous], IP TRAFFIC
[4]  
[Anonymous], 1992, ADAPTATION NATURAL A
[5]   Bayesian neural networks for Internet traffic classification [J].
Auld, Tom ;
Moore, Andrew W. ;
Gull, Stephen F. .
IEEE TRANSACTIONS ON NEURAL NETWORKS, 2007, 18 (01) :223-239
[6]  
*DARPA, 1999, INTR DET EV
[7]  
HOFMAN A, 2004, P IEEE NEURAL NETWOR, V2, P1563
[8]  
LEE CH, 2006, P IEEE C SOFTW ENG A, P109
[9]  
LEKKAS M, 2007, APPL INNOVATIONS INT, V15, P303
[10]   Use of K-Nearest Neighbor classifier for intrusion detection [J].
Liao, YH ;
Vemuri, VR .
COMPUTERS & SECURITY, 2002, 21 (05) :439-448