A triangle area based nearest neighbors approach to intrusion detection

被引:147
作者
Tsai, Chih-Fong [1 ]
Lin, Chia-Ying [1 ]
机构
[1] Natl Cent Univ, Dept Informat Management, Chungli, Taiwan
关键词
Intrusion detection; Machine learning; Triangle area; k-means; k-nearest neighbors; Support vector machines; ALGORITHM;
D O I
10.1016/j.patcog.2009.05.017
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Intrusion detection is a necessary step to identify unusual access or attacks to secure internal networks. In general, intrusion detection can be approached by machine learning techniques. In literature, advanced techniques by hybrid learning or ensemble methods have been considered, and related work has shown that they are superior to the models using single machine learning techniques. This paper proposes a hybrid learning model based on the triangle area based nearest neighbors (TANN) in order to detect attacks more effectively. In TANN, the k-means clustering is firstly used to obtain cluster centers corresponding to the attack classes, respectively. Then, the triangle area by two cluster centers with one data from the given dataset is calculated and formed a new feature signature of the data. Finally, the k-NN classifier is used to classify similar attacks based on the new feature represented by triangle areas. By using KDD-Cup '99 as the simulation dataset, the experimental results show that TANN can effectively detect intrusion attacks and provide higher accuracy and detection rates, and the lower false alarm rate than three baseline models based on support vector machines, k-NN, and the hybrid centroid-based classification model by combining k-means and k-NN. (C) 2009 Elsevier Ltd. All rights reserved.
引用
收藏
页码:222 / 229
页数:8
相关论文
共 25 条
  • [1] A parallel genetic local search algorithm for intrusion detection in computer networks
    Abadeh, Mohammad Saniee
    Habibi, Jafar
    Barzegar, Zeynab
    Sergi, Muna
    [J]. ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE, 2007, 20 (08) : 1058 - 1069
  • [2] Cardoso-Cachopo A, 2007, APPLIED COMPUTING 2007, VOL 1 AND 2, P844, DOI 10.1145/1244002.1244189
  • [3] Application of SVM and ANN for intrusion detection
    Chen, WH
    Hsu, SH
    Shen, HP
    [J]. COMPUTERS & OPERATIONS RESEARCH, 2005, 32 (10) : 2617 - 2634
  • [4] Hybrid flexible neural-tree-based intrusion detection systems
    Chen, Yuehui
    Akbraham, Ajith
    Yang, Bo
    [J]. INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS, 2007, 22 (04) : 337 - 352
  • [5] DOKAS P, 2002, P NSF WORKSH NEXT GE
  • [6] An introduction to ROC analysis
    Fawcett, Tom
    [J]. PATTERN RECOGNITION LETTERS, 2006, 27 (08) : 861 - 874
  • [7] Statistical pattern recognition: A review
    Jain, AK
    Duin, RPW
    Mao, JC
    [J]. IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 2000, 22 (01) : 4 - 37
  • [8] A hierarchical SOM-based intrusion detection system
    Kayacik, H. Gunes
    Zincir-Heywood, A. Nur
    Heywood, Malcolm I.
    [J]. ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE, 2007, 20 (04) : 439 - 451
  • [9] A new intrusion detection system using support vector machines and hierarchical clustering
    Khan, Latifur
    Awad, Mamoun
    Thuraisingham, Bhavani
    [J]. VLDB JOURNAL, 2007, 16 (04) : 507 - 521
  • [10] Lee W, 2001, DISCEX'01: DARPA INFORMATION SURVIVABILITY CONFERENCE & EXPOSITION II, VOL I, PROCEEDINGS, P89, DOI 10.1109/DISCEX.2001.932195