On the capability of an SOM based intrusion detection system

被引:0
|
作者
Kayacik, HG [1 ]
Zincir-Heywood, AN [1 ]
Heywood, MI [1 ]
机构
[1] Dalhousie Univ, Fac Comp Sci, Halifax, NS B3H 1W5, Canada
关键词
intrusion detection systems; self-organizing feature map;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
An approach to network intrusion detection is investigated, based purely on a hierarchy of Self-Organizing Feature Maps. Our principle interest is to establish just how far such an approach can be taken in practice. To do so, the KDD benchmark dataset from the International Knowledge Discovery and Data Mining Tools Competition is employed. This supplies a connection-based description of a factitious computer network in which each connection is described in terms of 41 features. Unlike previous approaches, only 6 of the most basic features are employed. The resulting system is capable of detection (false positive) rates of 89% (4.6%), where this is at least as good as the alternative data-mining approaches that require all 41 features.
引用
收藏
页码:1808 / 1813
页数:6
相关论文
共 50 条
  • [1] SOM-based anomaly intrusion detection system
    Wang, Chun-Dong
    Yu, He-Feng
    Wang, Huai-Bin
    Liu, Kai
    EMBEDDED AND UBIQUITOUS COMPUTING, PROCEEDINGS, 2007, 4808 : 356 - 366
  • [2] A hierarchical SOM-based intrusion detection system
    Kayacik, H. Gunes
    Zincir-Heywood, A. Nur
    Heywood, Malcolm I.
    ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE, 2007, 20 (04) : 439 - 451
  • [3] SOM and PSO Based Alerts Clustering in Intrusion Detection System
    Jing Yongwen
    Li Lifen
    FRONTIERS OF MANUFACTURING SCIENCE AND MEASURING TECHNOLOGY III, PTS 1-3, 2013, 401 : 1453 - 1457
  • [4] Anormaly Intrusion Detection Based on SOM
    Li Min
    Wang Dongliang
    2009 WASE INTERNATIONAL CONFERENCE ON INFORMATION ENGINEERING, ICIE 2009, VOL I, 2009, : 40 - 43
  • [5] Intrusion Detection Based on Improved SOM with Optimized GA
    Jian-Hua, Zhao
    Wei-Hua, Li
    JOURNAL OF COMPUTERS, 2013, 8 (06) : 1456 - 1463
  • [6] IDSIC: an intrusion detection system with identification capability
    Pei-Te Chen
    Chi-Sung Laih
    International Journal of Information Security, 2008, 7 : 185 - 197
  • [7] IDSIC: an intrusion detection system with identification capability
    Chen, Pei-Te
    Laih, Chi-Sung
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2008, 7 (03) : 185 - 197
  • [8] Research on Intrusion Detection Based on an Improved SOM Neural Network
    Jiang, Dianbo
    Yang, Yahui
    Xia, Min
    FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 400 - 403
  • [9] Intrusion Detection Classifier Based on Dynamic SOM and Swarm Intelligence Clustering
    Feng, Yong
    Zhong, Jiang
    Xiong, Zhong-yang
    Ye, Chun-xiao
    Wu, Kai-gui
    ADVANCES IN COGNITIVE NEURODYNAMICS, PROCEEDINGS, 2008, : 969 - +
  • [10] A genetic SOM clustering algorithm for intrusion detection
    Ma, ZY
    ADVANCES IN NEURAL NETWORKS - ISNN 2005, PT 3, PROCEEDINGS, 2005, 3498 : 421 - 427