A triangle area based nearest neighbors approach to intrusion detection

被引:148
作者
Tsai, Chih-Fong [1 ]
Lin, Chia-Ying [1 ]
机构
[1] Natl Cent Univ, Dept Informat Management, Chungli, Taiwan
关键词
Intrusion detection; Machine learning; Triangle area; k-means; k-nearest neighbors; Support vector machines; ALGORITHM;
D O I
10.1016/j.patcog.2009.05.017
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Intrusion detection is a necessary step to identify unusual access or attacks to secure internal networks. In general, intrusion detection can be approached by machine learning techniques. In literature, advanced techniques by hybrid learning or ensemble methods have been considered, and related work has shown that they are superior to the models using single machine learning techniques. This paper proposes a hybrid learning model based on the triangle area based nearest neighbors (TANN) in order to detect attacks more effectively. In TANN, the k-means clustering is firstly used to obtain cluster centers corresponding to the attack classes, respectively. Then, the triangle area by two cluster centers with one data from the given dataset is calculated and formed a new feature signature of the data. Finally, the k-NN classifier is used to classify similar attacks based on the new feature represented by triangle areas. By using KDD-Cup '99 as the simulation dataset, the experimental results show that TANN can effectively detect intrusion attacks and provide higher accuracy and detection rates, and the lower false alarm rate than three baseline models based on support vector machines, k-NN, and the hybrid centroid-based classification model by combining k-means and k-NN. (C) 2009 Elsevier Ltd. All rights reserved.
引用
收藏
页码:222 / 229
页数:8
相关论文
共 25 条
[1]   A parallel genetic local search algorithm for intrusion detection in computer networks [J].
Abadeh, Mohammad Saniee ;
Habibi, Jafar ;
Barzegar, Zeynab ;
Sergi, Muna .
ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE, 2007, 20 (08) :1058-1069
[2]  
Cardoso-Cachopo A, 2007, APPLIED COMPUTING 2007, VOL 1 AND 2, P844, DOI 10.1145/1244002.1244189
[3]   Application of SVM and ANN for intrusion detection [J].
Chen, WH ;
Hsu, SH ;
Shen, HP .
COMPUTERS & OPERATIONS RESEARCH, 2005, 32 (10) :2617-2634
[4]   Hybrid flexible neural-tree-based intrusion detection systems [J].
Chen, Yuehui ;
Akbraham, Ajith ;
Yang, Bo .
INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS, 2007, 22 (04) :337-352
[5]  
DOKAS P, 2002, P NSF WORKSH NEXT GE
[6]   An introduction to ROC analysis [J].
Fawcett, Tom .
PATTERN RECOGNITION LETTERS, 2006, 27 (08) :861-874
[7]   Statistical pattern recognition: A review [J].
Jain, AK ;
Duin, RPW ;
Mao, JC .
IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 2000, 22 (01) :4-37
[8]   A hierarchical SOM-based intrusion detection system [J].
Kayacik, H. Gunes ;
Zincir-Heywood, A. Nur ;
Heywood, Malcolm I. .
ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE, 2007, 20 (04) :439-451
[9]   A new intrusion detection system using support vector machines and hierarchical clustering [J].
Khan, Latifur ;
Awad, Mamoun ;
Thuraisingham, Bhavani .
VLDB JOURNAL, 2007, 16 (04) :507-521
[10]  
Lee W, 2001, DISCEX'01: DARPA INFORMATION SURVIVABILITY CONFERENCE & EXPOSITION II, VOL I, PROCEEDINGS, P89, DOI 10.1109/DISCEX.2001.932195