Network Intrusion Detection using Diversity-based Centroid Mechanism

被引:5
作者
Gondal, Muhammad Shafique [1 ]
Malik, Arif Jamal [2 ]
Khan, Farrukh Aslam [1 ,3 ]
机构
[1] Natl Univ Comp & Emerging Sci, Dept Comp Sci, AK Brohi Rd H-11-4, Islamabad, Pakistan
[2] Fdn Univ, Dept Software Engn, Rawalpindi, Pakistan
[3] King Saud Univ, Ctr Excellence Informat Assurance, Riyadh, Saudi Arabia
来源
2015 12TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY - NEW GENERATIONS | 2015年
关键词
Intrusion Detection System (IDS); Centroid; Diversity; Classification;
D O I
10.1109/ITNG.2015.42
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Threats to computer networks are numerous and potentially devastating. Intrusion detection techniques provide protection to our data and track unauthorized access. Many algorithms and techniques have been proposed to improve the accuracy and minimize the false positive rate of the intrusion detection system (IDS). Statistical techniques, evolutionary techniques, and data mining techniques have also been used for this purpose. In this paper, we use a centroid-based technique for network intrusion detection in which the centroid is constructed on the basis of diversity. Diversity of a point is the sum of the distances from a point to all other points in a cluster. The point having minimum diversity is chosen as a centroid. The performance of diversity-based centroid shows significant improvement in the classification of intrusions. Experimental results on the KDDCup99 dataset demonstrate that the proposed method shows excellent performance in terms of accuracy, detection rate, and false positive rate.
引用
收藏
页码:224 / 228
页数:5
相关论文
共 16 条
[11]  
Shahri B. M. A., 2013, P GLOB ENG SCI TECHN
[12]   Innovative Genetic approach For Intrusion Detection by Using Decision Tree [J].
Sharma, Vikas ;
Nema, Aditi .
2013 INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORK TECHNOLOGIES (CSNT 2013), 2013, :418-422
[13]   A high performance centroid-based classification approach for language identification [J].
Takci, Hidayet ;
Gungor, Tunga .
PATTERN RECOGNITION LETTERS, 2012, 33 (16) :2077-2084
[14]   Usefulness of DARPA dataset for intrusion detection system evaluation [J].
Thomas, Ciza ;
Sharma, Vishwas ;
Balakrishnan, N. .
DATA MINING, INTRUSION DETECTION, INFORMATION ASSURANCE, AND DATA NETWORKS SECURITY 2008, 2008, 6973
[15]   Network Intrusion Detection Analysis with Neural Network and Particle Swarm Optimization Algorithm [J].
Tian, WenJie ;
Liu, JiCheng .
2010 CHINESE CONTROL AND DECISION CONFERENCE, VOLS 1-5, 2010, :1749-1752
[16]  
Wankhade K, 2013, 2013 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), P1615, DOI 10.1109/ICACCI.2013.6637422