Multivariate correlation analysis and geometric linear similarity for real-time intrusion detection systems

被引:9
作者
Derhab, Abdelouahid [1 ]
Bouras, Abdelghani [2 ]
机构
[1] King Saud Univ, Ctr Excellence Informat Assurance COEIA, Riyadh, Saudi Arabia
[2] King Saud Univ, Coll Engn, Dept Ind Engn, Riyadh, Saudi Arabia
关键词
intrusion detection; anomaly based; geometric linear similarity; multivariate; correlation analysis; SUPPORT VECTOR MACHINE; NETWORK; FRAMEWORK; CLASSIFICATION; IDS; ARCHITECTURE; PERFORMANCE; STATEFUL; SELF;
D O I
10.1002/sec.1074
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we propose an intrusion detection system (IDS) based on four approaches: (i) statistical-based IDS to reduce detection time; (ii) intertwining data acquisition phase and data preprocessing phase to ensure real-time detection; (iii) geometric linear similarity measure that improves detection accuracy compared with existing measures; and (iv) multivariate correlation analysis that extracts a subset of strongly correlated features to construct a normal behavioral graph. Based on this graph, we derive the normal profile composed of high-level features. We use NSL-KDD dataset to analyze and evaluate the efficiency of the proposed IDS at detecting denial-of-service (DOS) attacks. Experimental results show that the proposed IDS can achieve good results in terms of detection rate and false positive rate. For some DOS attacks, 100% detection rate is achieved with 1.55% false positive. We also use KDD99 dataset to compare the proposed IDS with two statistical-based methods and some data mining and machine learning-based methods. Comparison study shows that the proposed IDS achieves the best tradeoff between detection rate (99.76%) and false positive rate (0.6%). It also requires just a few microseconds to classify the connection as normal or attack with low CPU usage and low memory consumption. Copyright (c) 2014 John Wiley & Sons, Ltd.
引用
收藏
页码:1193 / 1212
页数:20
相关论文
共 87 条
  • [1] AHA DW, 1991, MACH LEARN, V6, P37, DOI 10.1007/BF00153759
  • [2] Alsharafat W, 2013, INT ARAB J INF TECHN, V10, P230
  • [3] Altwaijry H., 2013, IAENG T ENG TECHNOLO, P29
  • [4] A new intrusion detection method based on SVM with minimum within-class scatter
    An, Wenjuan
    Liang, Mangui
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2013, 6 (09) : 1064 - 1074
  • [5] [Anonymous], P 2012 USENIX C ANN
  • [6] [Anonymous], 2012, J INTERNET SERV INF
  • [7] [Anonymous], 2014, C4. 5: programs for machine learning
  • [8] [Anonymous], P SYST ADM NETW ENG
  • [9] [Anonymous], 2004, P 2004 ACM S APPL CO, DOI DOI 10.1145/967900.967989
  • [10] [Anonymous], 2012, International Journal of Scientific and Research Publications