Unsupervised Anomaly Detection Based on Clustering and Multiple One-Class SVM

被引:27
作者
Song, Jungsuk [1 ]
Takakura, Hiroki [2 ]
Okabe, Yasuo [2 ]
Kwon, Yongjin [3 ]
机构
[1] Kyoto Univ, Grad Sch Informat, Kyoto 6068501, Japan
[2] Kyoto Univ, Acad Ctr Comp & Media Studies, Kyoto 6068501, Japan
[3] Korea Aerosp Univ, Goyang Shi 412791, South Korea
关键词
intrusion detection system; clustering; one-class SVM; anomaly detection; INTRUSION; SUPPORT;
D O I
10.1587/transcom.E92.B.1981
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Intrusion detection system (IDS) has played an important role as a device to defend our networks from cyber attacks. However, since it is unable to detect unknown attacks, i.e., 0-day attacks, the ultimate challenge in intrusion detection field is how we can exactly identify such an attack by an automated manner. Over the past few years, several studies on solving these problems have been made on anomaly detection using unsupervised learning techniques such as clustering, one-class support vector machine (SVM), etc. Although they enable one to construct intrusion detection models at low cost and effort, and have capability to detect unforeseen attacks, they still have mainly two problems in intrusion detection: a low detection rate and a high false positive rate. In this paper, we propose a new anomaly detection method based on clustering and multiple one-class SVM in order to improve the detection rate while maintaining a low false positive rate. We evaluated our method using KDD Cup 1999 data set. Evaluation results show that our approach outperforms the existing algorithms reported in the literature; especially in detection of unknown attacks.
引用
收藏
页码:1981 / 1990
页数:10
相关论文
共 30 条
[1]  
Allen J, 2000, CMUSEI99TR028
[2]  
Ambwani T, 2003, IEEE IJCNN, P2300
[3]  
[Anonymous], 3 INT KNOWLEDGE DISC
[4]  
[Anonymous], 2002, ADV INF SECUR
[5]  
Bace R., 2001, NIST Special Publication on Intrusion Detection Systems
[6]  
Bouzida Y., 2006, IEEE IST WORKSH MON
[7]   Application of SVM and ANN for intrusion detection [J].
Chen, WH ;
Hsu, SH ;
Shen, HP .
COMPUTERS & OPERATIONS RESEARCH, 2005, 32 (10) :2617-2634
[8]  
Cristianini N., 2000, INTRO SUPPORT VECTOR
[9]   AN INTRUSION-DETECTION MODEL [J].
DENNING, DE .
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 1987, 13 (02) :222-232
[10]  
Dumais S., 1998, Proceedings of the 1998 ACM CIKM International Conference on Information and Knowledge Management, P148, DOI 10.1145/288627.288651