UTTAMA: An Intrusion Detection System Based on Feature Clustering and Feature Transformation

被引:0
|
作者
Arun Nagaraja
B. Uma
Rajesh kumar Gunupudi
机构
[1] Jain University,Department of Information Science and Engineering
[2] Malnad College of Engineering,Department of Information Science and Engineering
[3] VNR Vignana Jyothi Institute of Engineering and Technology,Department of Information Technology
来源
Foundations of Science | 2020年 / 25卷
关键词
Anomaly; Intrusion; Classifier; Outlier; Clustering; Dimensionality; Feature extraction;
D O I
暂无
中图分类号
学科分类号
摘要
Detecting Intrusions and anomalies is becoming much more challenging with new attacks popping out over a period of time. Achieving better accuracies by applying benchmark classifier algorithms used for identifying intrusions and anomalies have several hidden data mining challenges. Although neglected by many research findings, one of the most important and biggest challenges is the similarity or membership computation. Another challenge that cannot be simply neglected is the number of features that attributes to dimensionality. This research aims to come up with a new membership function to carry similarity computation that can be helpful for addressing feature dimensionality issues. In principle, this work is aimed at introducing a novel membership function that can help to achieve better classification accuracies and eventually lead to better intrusion and anomaly detection. Experiments are performed on KDD dataset with 41 attributes and also KDD dataset with 19 attributes. Recent approaches CANN and CLAPP have showed new approaches for intrusion detection. The proposed classifier is named as UTTAMA. UTTAMA performed better to both CANN and CLAPP approaches w.r.t overall classifier accuracy. Another promising outcome achieved using UTTAMA is the U2R and R2L attack accuracies. The importance of proposed approach is that the accuracy achieved using proposed approach outperforms CLAPP, CANN, SVM, KNN and other existing classifiers.
引用
收藏
页码:1049 / 1075
页数:26
相关论文
共 50 条
  • [21] Machine learning-based intrusion detection: feature selection versus feature extraction
    Ngo, Vu-Duc
    Vuong, Tuan-Cuong
    Van Luong, Thien
    Tran, Hung
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2024, 27 (03): : 2365 - 2379
  • [22] Feature Clustering based MIM for a New Feature Extraction Method
    El Ferchichi, S.
    Zidi, S.
    Laabidi, K.
    Ksouri, M.
    Maouche, S.
    INTERNATIONAL JOURNAL OF COMPUTERS COMMUNICATIONS & CONTROL, 2013, 8 (05) : 699 - 707
  • [23] Optimizing IoT intrusion detection system: feature selection versus feature extraction in machine learning
    Jing Li
    Mohd Shahizan Othman
    Hewan Chen
    Lizawati Mi Yusuf
    Journal of Big Data, 11
  • [24] Multi-agent intrusion detection system in industrial network using ant colony clustering approach and unsupervised feature extraction
    Tsang, Chi-Ho
    Kwong, Sam
    2005 IEEE International Conference on Industrial Technology - (ICIT), Vols 1 and 2, 2005, : 115 - 120
  • [25] A deep learning method with wrapper based feature extraction for wireless intrusion detection system
    Kasongo, Sydney Mambwe
    Sun, Yanxia
    COMPUTERS & SECURITY, 2020, 92 (92)
  • [26] A Deep Learning Method With Filter Based Feature Engineering for Wireless Intrusion Detection System
    Kasongo, Sydney Mambwe
    Sun, Yanxia
    IEEE ACCESS, 2019, 7 : 38597 - 38607
  • [27] CLAPP: A self constructing feature clustering approach for anomaly detection
    Kumar, Gunupudi Rajesh
    Mangathayaru, Nimmala
    Narsimha, Gugulothu
    Reddy, Gali Suresh
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2017, 74 : 417 - 429
  • [28] Session Duration Based Feature Extraction for Network Intrusion Detection in Control System Networks
    Ponomarev, Stanislav
    Atkison, Travis
    2016 INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE & COMPUTATIONAL INTELLIGENCE (CSCI), 2016, : 892 - 896
  • [29] Toward a feature classification scheme for network intrusion detection
    Onut, Iosif-Viorel
    Ghorbani, Ali A.
    CNSR 2006: COMMUNICATION NETWORKS AND SERVICES RESEARCH CONFERENCE, PROCEEDINGS, 2006, : 277 - +
  • [30] An Enhanced Intrusion Detection System Based on Clustering
    Borah, Samarjeet
    Panigrahi, Ranjit
    Chakraborty, Anindita
    PROGRESS IN ADVANCED COMPUTING AND INTELLIGENT ENGINEERING, VOL 2, 2018, 564 : 37 - 45