UTTAMA: An Intrusion Detection System Based on Feature Clustering and Feature Transformation

被引:0
作者
Arun Nagaraja
B. Uma
Rajesh kumar Gunupudi
机构
[1] Jain University,Department of Information Science and Engineering
[2] Malnad College of Engineering,Department of Information Science and Engineering
[3] VNR Vignana Jyothi Institute of Engineering and Technology,Department of Information Technology
来源
Foundations of Science | 2020年 / 25卷
关键词
Anomaly; Intrusion; Classifier; Outlier; Clustering; Dimensionality; Feature extraction;
D O I
暂无
中图分类号
学科分类号
摘要
Detecting Intrusions and anomalies is becoming much more challenging with new attacks popping out over a period of time. Achieving better accuracies by applying benchmark classifier algorithms used for identifying intrusions and anomalies have several hidden data mining challenges. Although neglected by many research findings, one of the most important and biggest challenges is the similarity or membership computation. Another challenge that cannot be simply neglected is the number of features that attributes to dimensionality. This research aims to come up with a new membership function to carry similarity computation that can be helpful for addressing feature dimensionality issues. In principle, this work is aimed at introducing a novel membership function that can help to achieve better classification accuracies and eventually lead to better intrusion and anomaly detection. Experiments are performed on KDD dataset with 41 attributes and also KDD dataset with 19 attributes. Recent approaches CANN and CLAPP have showed new approaches for intrusion detection. The proposed classifier is named as UTTAMA. UTTAMA performed better to both CANN and CLAPP approaches w.r.t overall classifier accuracy. Another promising outcome achieved using UTTAMA is the U2R and R2L attack accuracies. The importance of proposed approach is that the accuracy achieved using proposed approach outperforms CLAPP, CANN, SVM, KNN and other existing classifiers.
引用
收藏
页码:1049 / 1075
页数:26
相关论文
共 105 条
[1]  
Abaei G(2014)A survey on software fault detection based on different prediction approaches Vietnam Journal of Computer Science 1 7995-95
[2]  
Selamat A(2014)A survey on software fault detection based on different prediction approaches Vietnam J Comput Sci 1 79-127
[3]  
Abaei G(2017)A resource efficient encryption algorithm for multimedia big data Multimedia Tools and Applications 76 22703-996
[4]  
Selamat A(2018)A multithreaded programming approach for multimedia big data: Encryption system Multimedia Tools and Applications 77 10997-307
[5]  
Aljawarneh S(2018)GARUDA: Gaussian dissimilarity measure for feature representation and anomaly detection in Internet of things Journal of Supercomputing 2 1-72
[6]  
Yassein MB(2016)A conceptual security framework for cloud computing issues International Journal of Intelligent Information Technologies 26 984-15:58
[7]  
Talafha WA(2009)Learning deep architectures for AI Foundations and Trends in Machine Learning 1 300-49
[8]  
Aljawarneh S(2014)Security evaluation of pattern classifiers under attack IEEE Transactions on Knowledge and Data Engineering 41 1-4981
[9]  
Yassein MB(2007)Comprehensive survey on distance/similarity measures between probability density functions International Journal of Mathematical Models and Methods in Applied Sciences 41 15:1-520
[10]  
Talafha WA(2009)Anomaly detection: A survey ACM Computing Surveys 2 39-17