A Genetic Clustering Technique for Anomaly-Based Intrusion Detection Systems

被引:0
|
作者
Aissa, Naila Belhadj [1 ]
Guerroumi, Mohamed [1 ]
机构
[1] Univ Sci & Technol Houari Boumediene, Fac Elect & Comp Sci Algiers, Algiers, Algeria
来源
2015 16TH IEEE/ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING AND PARALLEL/DISTRIBUTED COMPUTING (SNPD) | 2015年
关键词
Anomaly-based IDS; clustering; genetic algorithm; false positive rate; false negative rate; KDD; 99;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The Security of network resources, computer systems and data has become a great issue resulting from the advent of the internet and the threats that comes with it. To ensure a good level of security, Intrusion Detection Systems (IDS) have been widely deployed and many techniques to detect, identify and classify attacks have been proposed, developed and tested either offline or online. In this paper, we propose a clustering-based detection technique using a genetic algorithm named Genetic Clustering for Anomaly-based Detection (GC-AD). GC-AD uses a dissimilarity measure to form k clusters. It, then, applies a genetic process where each chromosome represents the centroids of the k clusters. A two-stage fitness function is proposed. i) We introduce a confidence interval to refine the clusters in order to obtain partitions that are more homogeneous. ii) We compute and maximize the inter-cluster variance over the generations. The accuracy of our technique is tested on different subset from KDD99 dataset. The results are discussed and compared to k-means clustering algorithm.
引用
收藏
页码:87 / 92
页数:6
相关论文
共 50 条
  • [1] Applications of Clustering Methods to Anomaly-Based Intrusion Detection Systems
    Nikolova, Evgeniya
    Jecheva, Veselina
    2015 8TH INTERNATIONAL CONFERENCE ON DATABASE THEORY AND APPLICATION (DTA), 2015, : 37 - 41
  • [2] Anomaly-based intrusion detection using fuzzy rough clustering
    Chimphlee, Witcha
    Abdullah, Abdul Hanan
    Sap, Mohd Noor Md
    Srinoy, Surat
    Chimphlee, Siriporn
    2006 International Conference on Hybrid Information Technology, Vol 1, Proceedings, 2006, : 329 - 334
  • [3] An efficient hybrid SVDD/Clustering approach for anomaly-based intrusion detection
    Kenaza, Tayeb
    Bennaceur, Khadidja
    Labed, Abdenour
    33RD ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING, 2018, : 435 - 443
  • [4] A clustering method for improving performance of anomaly-based intrusion detection system
    Song, Jungsuk
    Ohira, Kenji
    Takakura, Hiroki
    Okabe, Yasuo
    Kwon, Yongjin
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2008, E91D (05) : 1282 - 1291
  • [5] Anomaly-based network intrusion detection: Techniques, systems and challenges
    Garcia-Teodoro, P.
    Diaz-Verdejo, J.
    Macia-Fernandez, G.
    Vazquez, E.
    COMPUTERS & SECURITY, 2009, 28 (1-2) : 18 - 28
  • [6] Anomaly-based Intrusion Detection using Distributed intelligent systems
    Morel, Benoit
    CRISIS: 2008 THIRD INTERNATIONAL CONFERENCE ON RISKS AND SECURITY OF INTERNET AND SYSTEMS, PROCEEDINGS, 2008, : 37 - 44
  • [7] An Adaptive Threshold Method for Anomaly-based Intrusion Detection Systems
    Chae, Younghun
    Katenka, Natallia
    DiPippo, Lisa
    2019 IEEE 18TH INTERNATIONAL SYMPOSIUM ON NETWORK COMPUTING AND APPLICATIONS (NCA), 2019, : 221 - 224
  • [8] An application of learning problem in anomaly-based intrusion detection systems
    Jecheva, Veselina G.
    Nikolova, Evgeniya P.
    ARES 2007: SECOND INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, PROCEEDINGS, 2007, : 853 - 860
  • [9] Implementation of adaptive scheme in evolutionary technique for anomaly-based intrusion detection
    Shubhra Dwivedi
    Manu Vardhan
    Sarsij Tripathi
    Alok Kumar Shukla
    Evolutionary Intelligence, 2020, 13 : 103 - 117
  • [10] Implementation of adaptive scheme in evolutionary technique for anomaly-based intrusion detection
    Dwivedi, Shubhra
    Vardhan, Manu
    Tripathi, Sarsij
    Shukla, Alok Kumar
    EVOLUTIONARY INTELLIGENCE, 2020, 13 (01) : 103 - 117