Network Intrusion Detection using Diversity-based Centroid Mechanism

被引:5
作者
Gondal, Muhammad Shafique [1 ]
Malik, Arif Jamal [2 ]
Khan, Farrukh Aslam [1 ,3 ]
机构
[1] Natl Univ Comp & Emerging Sci, Dept Comp Sci, AK Brohi Rd H-11-4, Islamabad, Pakistan
[2] Fdn Univ, Dept Software Engn, Rawalpindi, Pakistan
[3] King Saud Univ, Ctr Excellence Informat Assurance, Riyadh, Saudi Arabia
来源
2015 12TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY - NEW GENERATIONS | 2015年
关键词
Intrusion Detection System (IDS); Centroid; Diversity; Classification;
D O I
10.1109/ITNG.2015.42
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Threats to computer networks are numerous and potentially devastating. Intrusion detection techniques provide protection to our data and track unauthorized access. Many algorithms and techniques have been proposed to improve the accuracy and minimize the false positive rate of the intrusion detection system (IDS). Statistical techniques, evolutionary techniques, and data mining techniques have also been used for this purpose. In this paper, we use a centroid-based technique for network intrusion detection in which the centroid is constructed on the basis of diversity. Diversity of a point is the sum of the distances from a point to all other points in a cluster. The point having minimum diversity is chosen as a centroid. The performance of diversity-based centroid shows significant improvement in the classification of intrusions. Experimental results on the KDDCup99 dataset demonstrate that the proposed method shows excellent performance in terms of accuracy, detection rate, and false positive rate.
引用
收藏
页码:224 / 228
页数:5
相关论文
共 16 条
[1]  
Ali S., 2010, ASS COMPUTING MACHIN, P1, DOI DOI 10.1145/1943628.1943667
[2]  
Aziz ASA, 2013, FED CONF COMPUT SCI, P769
[3]   Anomaly-based network intrusion detection: Techniques, systems and challenges [J].
Garcia-Teodoro, P. ;
Diaz-Verdejo, J. ;
Macia-Fernandez, G. ;
Vazquez, E. .
COMPUTERS & SECURITY, 2009, 28 (1-2) :18-28
[4]  
Guan H., 2009, WWW 09 P 18 INT C WO, P201
[5]  
Han EH, 2000, LECT NOTES COMPUT<D>, V1910, P424
[6]  
Hoque MS., 2012, INT J NETWORK SECURI, V4, P109, DOI [DOI 10.5121/IJNSA.2012.4208, 10.5121/ijnsa.2012.4208]
[7]  
Kohavi R., 1998, Mach Learn, V30, P271, DOI DOI 10.1023/A:1017181826899
[8]   Network intrusion detection using hybrid binary PSO and random forests algorithm [J].
Malik, Arif Jamal ;
Shahzad, Waseem ;
Khan, Farrukh Aslam .
SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (16) :2646-2660
[9]  
Malik AJ, 2011, IEEE C EVOL COMPUTAT, P662
[10]  
Olusola A. A., 2010, P WORLD C ENG COMP S