On the capability of an SOM based intrusion detection system

被引:0
|
作者
Kayacik, HG [1 ]
Zincir-Heywood, AN [1 ]
Heywood, MI [1 ]
机构
[1] Dalhousie Univ, Fac Comp Sci, Halifax, NS B3H 1W5, Canada
关键词
intrusion detection systems; self-organizing feature map;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
An approach to network intrusion detection is investigated, based purely on a hierarchy of Self-Organizing Feature Maps. Our principle interest is to establish just how far such an approach can be taken in practice. To do so, the KDD benchmark dataset from the International Knowledge Discovery and Data Mining Tools Competition is employed. This supplies a connection-based description of a factitious computer network in which each connection is described in terms of 41 features. Unlike previous approaches, only 6 of the most basic features are employed. The resulting system is capable of detection (false positive) rates of 89% (4.6%), where this is at least as good as the alternative data-mining approaches that require all 41 features.
引用
收藏
页码:1808 / 1813
页数:6
相关论文
共 50 条
  • [31] Laocoonte: An Agent Based Intrusion Detection System
    Paez, Rafael
    Torres, Miguel
    PROCEEDINGS OF THE 2009 INTERNATIONAL SYMPOSIUM ON COLLABORATIVE TECHNOLOGIES AND SYSTEMS, 2009, : 217 - 224
  • [32] PC based Ultrasonic Intrusion Detection System
    Unni, R.
    Pati, U. C.
    PROCEEDINGS OF THE 2018 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATION AND SIGNAL PROCESSING (ICCSP), 2018, : 942 - 947
  • [33] Autoencoder-based Intrusion Detection System
    Kamalov, Firuz
    Zgheib, Rita
    Leung, Ho Hon
    Al-Gindy, Ahmed
    Moussa, Sherif
    2021 7TH INTERNATIONAL CONFERENCE ON ENGINEERING AND EMERGING TECHNOLOGIES (ICEET 2021), 2021, : 707 - 711
  • [34] Distributed intrusion detection system based on ARTIS
    Qiao, PL
    Su, J
    Sun, CW
    Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2005, 2005, 5812 : 356 - 363
  • [35] Intrusion detection system based on mobile agent
    Zhu, LP
    Li, Q
    Wang, X
    ISTM/2005: 6th International Symposium on Test and Measurement, Vols 1-9, Conference Proceedings, 2005, : 7888 - 7891
  • [36] A multiple agents based intrusion detection system
    Ma, WL
    Sharma, D
    KNOWLEDGE-BASED INTELLIGENT INFORMATION AND ENGINEERING SYSTEMS, PT 1, PROCEEDINGS, 2005, 3681 : 205 - 211
  • [37] MOBILE AGENT BASED INTRUSION DETECTION SYSTEM
    Can, Okan
    2014 22ND SIGNAL PROCESSING AND COMMUNICATIONS APPLICATIONS CONFERENCE (SIU), 2014, : 1363 - 1366
  • [38] Cloud Intrusion Detection System Based on SVM
    Alheeti K.M.A.
    Lateef A.A.A.
    Alzahrani A.
    Imran A.
    Al Dosary D.
    International Journal of Interactive Mobile Technologies, 2023, 17 (11) : 101 - 114
  • [39] Intrusion Detection System Based on Pattern Recognition
    Mohamed M. Abdeldayem
    Arabian Journal for Science and Engineering, 2023, 48 : 9849 - 9857
  • [40] A Constraint-based Intrusion Detection System
    Hasan, Md Siam
    Dean, Thomas
    Imam, Fahim T.
    Garcia, Francisco
    Leblanc, Sylvain P.
    Zulkernine, Mohammad
    PROCEEDINGS OF THE FIFTH EUROPEAN CONFERENCE ON THE ENGINEERING OF COMPUTER-BASED SYSTEMS (ECBS 2017), 2017,