Modification of supervised OPF-based intrusion detection systems using unsupervised learning and social network concept

被引:40
作者
Bostani, Hamid [1 ]
Sheikhan, Mansour [2 ]
机构
[1] Islamic Azad Univ, South Tehran Branch, Dept Comp Engn, Tehran, Iran
[2] Islamic Azad Univ, South Tehran Branch, Dept Commun Engn, Tehran, Iran
关键词
Optimum-path forest; Classification; Clustering; Pruning; Centrality; Prestige; Social network analysis; OPTIMUM-PATH FOREST; ANOMALY DETECTION; CLASSIFICATION; CENTRALITY; ENSEMBLE; DESIGN; VALIDATION; COMMUNITY;
D O I
10.1016/j.patcog.2016.08.027
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Optimum-path forest (OPF) is a graph-based machine learning method that can overcome some limitations of the traditional machine learning algorithms that have been used in intrusion detection systems. This paper presents a novel approach for intrusion detection using a modified OPF (MOPF) algorithm for improving the performance of traditional OPF in terms of detection rate (DR), false alarm rate (FAR), and time of execution. To address the problem of scalability in large datasets and also for achieving high attack recognition rates, the proposed framework employs the k-means clustering algorithm, as a partitioning module, for generating different homogeneous training subsets from original heterogeneous training samples. In the proposed MOPF algorithm, the distance between unlabeled samples and the root (prototype) of every sample in OPF is also considered in classifying unlabeled samples with the aim of improving the accuracy rate of traditional OPF algorithm. Moreover, the centrality and the prestige concepts in the social network analysis are employed in a pruning module for determining the most informative samples in training subsets to speed up the traditional OPF algorithm. The experimental results on NSL-KDD dataset show that the proposed method performs better than traditional OPF in terms of accuracy rate, DR, FAR, and cost per example (CPE) evaluation metrics. (C) 2016 Elsevier Ltd. All rights reserved.
引用
收藏
页码:56 / 72
页数:17
相关论文
共 79 条
[1]   A novel SVM-kNN-PSO ensemble method for intrusion detection system [J].
Aburomman, Abdulla Amin ;
Reaz, Mamun Bin Ibne .
APPLIED SOFT COMPUTING, 2016, 38 :360-372
[2]   Mutual information-based feature selection for intrusion detection systems [J].
Amiri, Fatemeh ;
Yousefi, MohammadMahdi Rezaei ;
Lucas, Caro ;
Shakery, Azadeh ;
Yazdani, Nasser .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2011, 34 (04) :1184-1199
[3]  
Amorim W. P., 2012, 2012 XXV SIBGRAPI - Conference on Graphics, Patterns and Images (SIBGRAPI 2012), P330, DOI 10.1109/SIBGRAPI.2012.53
[4]  
[Anonymous], NSL KDD DATA SET
[5]  
[Anonymous], 2007, AM C INF SYST AMCIS
[6]  
[Anonymous], IOSR J COMPUT ENG
[7]  
[Anonymous], ENCY INFORM ASSURANC
[8]  
[Anonymous], 2014, J COMPUTER COMMUNICA
[9]  
[Anonymous], 2004, EFFICIENT INTRUSION
[10]  
[Anonymous], RC21719 IBM RES DIV