A Genetic Clustering Technique for Anomaly-Based Intrusion Detection Systems

被引:0
作者
Aissa, Naila Belhadj [1 ]
Guerroumi, Mohamed [1 ]
机构
[1] Univ Sci & Technol Houari Boumediene, Fac Elect & Comp Sci Algiers, Algiers, Algeria
来源
2015 16TH IEEE/ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING AND PARALLEL/DISTRIBUTED COMPUTING (SNPD) | 2015年
关键词
Anomaly-based IDS; clustering; genetic algorithm; false positive rate; false negative rate; KDD; 99;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The Security of network resources, computer systems and data has become a great issue resulting from the advent of the internet and the threats that comes with it. To ensure a good level of security, Intrusion Detection Systems (IDS) have been widely deployed and many techniques to detect, identify and classify attacks have been proposed, developed and tested either offline or online. In this paper, we propose a clustering-based detection technique using a genetic algorithm named Genetic Clustering for Anomaly-based Detection (GC-AD). GC-AD uses a dissimilarity measure to form k clusters. It, then, applies a genetic process where each chromosome represents the centroids of the k clusters. A two-stage fitness function is proposed. i) We introduce a confidence interval to refine the clusters in order to obtain partitions that are more homogeneous. ii) We compute and maximize the inter-cluster variance over the generations. The accuracy of our technique is tested on different subset from KDD99 dataset. The results are discussed and compared to k-means clustering algorithm.
引用
收藏
页码:87 / 92
页数:6
相关论文
共 19 条
[1]  
Amer S. H., 2010, DEFENSE CYBER SECURI, V13
[2]  
[Anonymous], ARXIV14037726
[3]  
[Anonymous], 1990, Finding Groups in Data: An Introduction to Cluster Analysis
[4]  
Chen Y, 2006, LECT NOTES COMPUT SC, V4318, P153
[5]  
Coello Coello C. A., 2007, Genetic and Evolutionary Computation, V5, DOI DOI 10.1007/978-0-387-36797-2
[6]   AN INTRUSION-DETECTION MODEL [J].
DENNING, DE .
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 1987, 13 (02) :222-232
[7]   Anomaly detection methods in wired networks: a survey and taxonomy [J].
Estevez-Tapiador, JM ;
Garcia-Teodoro, P ;
Diaz-Verdejo, JE .
COMPUTER COMMUNICATIONS, 2004, 27 (16) :1569-1584
[8]  
Golberg D.E., 1989, Genetic algorithms in search, optimization, and machine learning, V1989
[9]  
Gunes Kayacik H., 2005, P 3 ANN C PRIVACY SE, V94, P1723
[10]  
Gupta P, 2011, COMM COM INF SC, V198, P122