On the capability of an SOM based intrusion detection system

被引:0
|
作者
Kayacik, HG [1 ]
Zincir-Heywood, AN [1 ]
Heywood, MI [1 ]
机构
[1] Dalhousie Univ, Fac Comp Sci, Halifax, NS B3H 1W5, Canada
关键词
intrusion detection systems; self-organizing feature map;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
An approach to network intrusion detection is investigated, based purely on a hierarchy of Self-Organizing Feature Maps. Our principle interest is to establish just how far such an approach can be taken in practice. To do so, the KDD benchmark dataset from the International Knowledge Discovery and Data Mining Tools Competition is employed. This supplies a connection-based description of a factitious computer network in which each connection is described in terms of 41 features. Unlike previous approaches, only 6 of the most basic features are employed. The resulting system is capable of detection (false positive) rates of 89% (4.6%), where this is at least as good as the alternative data-mining approaches that require all 41 features.
引用
收藏
页码:1808 / 1813
页数:6
相关论文
共 50 条
  • [11] A new approach of network intrusion detection using HVDM-based SOM
    Wang, L
    Yang, Y
    Sun, SX
    ADVANCES IN NEURAL NETWORKS - ISNN 2005, PT 3, PROCEEDINGS, 2005, 3498 : 488 - 493
  • [12] Cascaded hybrid intrusion detection model based on SOM and RBF neural networks
    Almiani, Muder
    AbuGhazleh, Alia
    Al-Rahayfeh, Amer
    Razaque, Abdul
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2020, 32 (21):
  • [13] General Study of Intrusion Detection System and Survey of Agent Based Intrusion Detection System
    Saxena, Aumreesh Ku.
    Sinha, Sitesh
    Shukla, Piyush
    2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND AUTOMATION (ICCCA), 2017, : 417 - 421
  • [14] PCA filtering and probabilistic SOM for network intrusion detection
    De la Hoz, Eduardo
    De La Hoz, Emiro
    Ortiz, Andres
    Ortega, Julio
    Prieto, Beatriz
    NEUROCOMPUTING, 2015, 164 : 71 - 81
  • [15] An intrusion detection system based on system call
    Shen, Yue
    Yu, Fei
    Zhang, Ling-Fen
    An, Ji-Yao
    Zhu, Miao-Liang
    2005 1ST IEEE/IFIP INTERNATIONAL CONFERENCE IN CENTRAL ASIA ON INTERNET (ICI), 2005, : 150 - 153
  • [16] Kernel based intrusion detection system
    Kim, BJ
    Kim, IK
    Fourth Annual ACIS International Conference on Computer and Information Science, Proceedings, 2005, : 13 - 18
  • [17] Intrusion Detection System Based on Classification
    Gong Shang-fu
    Zhao Chun-lan
    2012 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT CONTROL, AUTOMATIC DETECTION AND HIGH-END EQUIPMENT (ICADE), 2012, : 78 - 83
  • [18] An Intrusion Detection System Based on Hadoop
    Shi, Zhiguo
    An, Jianwei
    IEEE 12TH INT CONF UBIQUITOUS INTELLIGENCE & COMP/IEEE 12TH INT CONF ADV & TRUSTED COMP/IEEE 15TH INT CONF SCALABLE COMP & COMMUN/IEEE INT CONF CLOUD & BIG DATA COMP/IEEE INT CONF INTERNET PEOPLE AND ASSOCIATED SYMPOSIA/WORKSHOPS, 2015, : 826 - 830
  • [19] An Intrusion Detection System Based on WiMAX
    Zhou, Bo
    2011 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT), VOLS 1-4, 2012, : 2448 - 2451
  • [20] Host Based Intrusion Detection System
    Kothari, Sandip
    Parmar, Hemant
    Das, Eshan
    Panda, Neroja
    Ahmed, Afrin
    Marchang, Jims
    2011 INTERNATIONAL CONFERENCE ON COMPUTERS, COMMUNICATIONS, CONTROL AND AUTOMATION (CCCA 2011), VOL III, 2010, : 336 - 339