Multivariate correlation analysis and geometric linear similarity for real-time intrusion detection systems

被引:9
作者
Derhab, Abdelouahid [1 ]
Bouras, Abdelghani [2 ]
机构
[1] King Saud Univ, Ctr Excellence Informat Assurance COEIA, Riyadh, Saudi Arabia
[2] King Saud Univ, Coll Engn, Dept Ind Engn, Riyadh, Saudi Arabia
关键词
intrusion detection; anomaly based; geometric linear similarity; multivariate; correlation analysis; SUPPORT VECTOR MACHINE; NETWORK; FRAMEWORK; CLASSIFICATION; IDS; ARCHITECTURE; PERFORMANCE; STATEFUL; SELF;
D O I
10.1002/sec.1074
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we propose an intrusion detection system (IDS) based on four approaches: (i) statistical-based IDS to reduce detection time; (ii) intertwining data acquisition phase and data preprocessing phase to ensure real-time detection; (iii) geometric linear similarity measure that improves detection accuracy compared with existing measures; and (iv) multivariate correlation analysis that extracts a subset of strongly correlated features to construct a normal behavioral graph. Based on this graph, we derive the normal profile composed of high-level features. We use NSL-KDD dataset to analyze and evaluate the efficiency of the proposed IDS at detecting denial-of-service (DOS) attacks. Experimental results show that the proposed IDS can achieve good results in terms of detection rate and false positive rate. For some DOS attacks, 100% detection rate is achieved with 1.55% false positive. We also use KDD99 dataset to compare the proposed IDS with two statistical-based methods and some data mining and machine learning-based methods. Comparison study shows that the proposed IDS achieves the best tradeoff between detection rate (99.76%) and false positive rate (0.6%). It also requires just a few microseconds to classify the connection as normal or attack with low CPU usage and low memory consumption. Copyright (c) 2014 John Wiley & Sons, Ltd.
引用
收藏
页码:1193 / 1212
页数:20
相关论文
共 87 条
[1]  
AHA DW, 1991, MACH LEARN, V6, P37, DOI 10.1007/BF00153759
[2]  
Alsharafat W, 2013, INT ARAB J INF TECHN, V10, P230
[3]  
Altwaijry H., 2013, IAENG T ENG TECHNOLO, P29
[4]   A new intrusion detection method based on SVM with minimum within-class scatter [J].
An, Wenjuan ;
Liang, Mangui .
SECURITY AND COMMUNICATION NETWORKS, 2013, 6 (09) :1064-1074
[5]  
[Anonymous], P 2012 USENIX C ANN
[6]  
[Anonymous], 2012, J INTERNET SERV INF
[7]  
[Anonymous], 2014, C4. 5: programs for machine learning
[8]  
[Anonymous], P SYST ADM NETW ENG
[9]  
[Anonymous], 2004, P 2004 ACM S APPL CO, DOI DOI 10.1145/967900.967989
[10]  
[Anonymous], 2012, International Journal of Scientific and Research Publications