Evaluating clustering techniques for network intrusion detection

被引:0
作者
Zhong, S [1 ]
Khoshgoftaar, T [1 ]
Seliya, N [1 ]
机构
[1] Florida Atlantic Univ, Dept Comp Sci & Engn, Boca Raton, FL 33431 USA
来源
TENTH ISSAT INTERNATIONAL CONFERENCE ON RELIABILITY AND QUALITY IN DESIGN, PROCEEDINGS | 2004年
关键词
network security; unsupervised learning; clustering algorithms; intrusion detection;
D O I
暂无
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Detecting network intrusions has been a critical yet difficult task in network security. To protect networks, intrusion detection systems aim to identify attacks with a high detection rate and a low false alarm rate. Temporal changes in network Intrusion patterns and characteristics often render existing classification-based Intrusion detection data mining techniques ineffective. To address this challenge, researchers have recently revived unsupervised learning techniques to help identify anomalous behaviors or new attacks. This paper Investigates and compares four centroid-based clustering algorithms - k-means, Mixture-Of-Spherical Gaussians, Self-Organizing Map, and Neural-Gas - for analyzing large network security data sets. A simple but effective self-labeling heuristic Is proposed to detect attack clusters given unlabeled network traffic audit data. Empirical studies using the network security data set from the DARPA 1998 offline intrusion detection project (KDD 1999 Cup) show the feasibility of unsupervised intrusion detection and promising detection results.
引用
收藏
页码:173 / 177
页数:5
相关论文
共 15 条
[1]   COMPETITIVE LEARNING ALGORITHMS FOR VECTOR QUANTIZATION [J].
AHALT, SC ;
KRISHNAMURTHY, AK ;
CHEN, PK ;
MELTON, DE .
NEURAL NETWORKS, 1990, 3 (03) :277-290
[2]   MODEL-BASED GAUSSIAN AND NON-GAUSSIAN CLUSTERING [J].
BANFIELD, JD ;
RAFTERY, AE .
BIOMETRICS, 1993, 49 (03) :803-821
[3]  
Bishop C. M., 1996, Neural networks for pattern recognition
[4]  
Blimes J.A., 1998, GENTLE TUTORIAL EM A
[5]   MAXIMUM LIKELIHOOD FROM INCOMPLETE DATA VIA EM ALGORITHM [J].
DEMPSTER, AP ;
LAIRD, NM ;
RUBIN, DB .
JOURNAL OF THE ROYAL STATISTICAL SOCIETY SERIES B-METHODOLOGICAL, 1977, 39 (01) :1-38
[6]   AN INTRUSION-DETECTION MODEL [J].
DENNING, DE .
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 1987, 13 (02) :222-232
[7]  
Eskin E., 2000, P 17 INT C MACH LEAR, P255, DOI DOI 10.1109/ICCSA.2008.70
[8]  
KOHONEN T, 1997, SELF ORG MAP
[9]  
Lee W., 1999, P 5 ACM SIGKDD INT C, DOI DOI 10.1145/312129.312212
[10]  
MacQueen J., 1967, P 5 BERK S MATH STAT, V14, P281, DOI DOI 10.1234/12345678