UTTAMA: An Intrusion Detection System Based on Feature Clustering and Feature Transformation

被引:0
|
作者
Arun Nagaraja
B. Uma
Rajesh kumar Gunupudi
机构
[1] Jain University,Department of Information Science and Engineering
[2] Malnad College of Engineering,Department of Information Science and Engineering
[3] VNR Vignana Jyothi Institute of Engineering and Technology,Department of Information Technology
来源
Foundations of Science | 2020年 / 25卷
关键词
Anomaly; Intrusion; Classifier; Outlier; Clustering; Dimensionality; Feature extraction;
D O I
暂无
中图分类号
学科分类号
摘要
Detecting Intrusions and anomalies is becoming much more challenging with new attacks popping out over a period of time. Achieving better accuracies by applying benchmark classifier algorithms used for identifying intrusions and anomalies have several hidden data mining challenges. Although neglected by many research findings, one of the most important and biggest challenges is the similarity or membership computation. Another challenge that cannot be simply neglected is the number of features that attributes to dimensionality. This research aims to come up with a new membership function to carry similarity computation that can be helpful for addressing feature dimensionality issues. In principle, this work is aimed at introducing a novel membership function that can help to achieve better classification accuracies and eventually lead to better intrusion and anomaly detection. Experiments are performed on KDD dataset with 41 attributes and also KDD dataset with 19 attributes. Recent approaches CANN and CLAPP have showed new approaches for intrusion detection. The proposed classifier is named as UTTAMA. UTTAMA performed better to both CANN and CLAPP approaches w.r.t overall classifier accuracy. Another promising outcome achieved using UTTAMA is the U2R and R2L attack accuracies. The importance of proposed approach is that the accuracy achieved using proposed approach outperforms CLAPP, CANN, SVM, KNN and other existing classifiers.
引用
收藏
页码:1049 / 1075
页数:26
相关论文
共 50 条
  • [41] Network intrusion detection method based on deep learning feature extraction
    Song Y.
    Hou B.
    Cai Z.
    Huazhong Keji Daxue Xuebao (Ziran Kexue Ban)/Journal of Huazhong University of Science and Technology (Natural Science Edition), 2021, 49 (02): : 115 - 120
  • [42] Automatic Feature Extraction and Selection For Machine Learning Based Intrusion Detection
    Liu, Jinjie
    Chung, Sun Sunnie
    2019 IEEE SMARTWORLD, UBIQUITOUS INTELLIGENCE & COMPUTING, ADVANCED & TRUSTED COMPUTING, SCALABLE COMPUTING & COMMUNICATIONS, CLOUD & BIG DATA COMPUTING, INTERNET OF PEOPLE AND SMART CITY INNOVATION (SMARTWORLD/SCALCOM/UIC/ATC/CBDCOM/IOP/SCI 2019), 2019, : 1400 - 1405
  • [43] Botnet detection using graph-based feature clustering
    Chowdhury S.
    Khanzadeh M.
    Akula R.
    Zhang F.
    Zhang S.
    Medal H.
    Marufuzzaman M.
    Bian L.
    Journal of Big Data, 4 (1)
  • [44] Implementation of Intrusion Detection System Using Artificial Bee Colony with Correlation-Based Feature Selection
    Vardhini, K. Kanaka
    Sitamahalakshmi, T.
    PROCEEDINGS OF THE FIRST INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND INFORMATICS, ICCII 2016, 2017, 507 : 107 - 115
  • [45] A clustering-based feature selection via feature separability
    Jiang, Shengyi
    Wang, Lianxi
    JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2016, 31 (02) : 927 - 937
  • [46] An Enhanced Crow Search Inspired Feature Selection Technique for Intrusion Detection Based Wireless Network System
    Khanna, Ashish
    Rani, Poonam
    Garg, Punnet
    Singh, Prakash Kumar
    Khamparia, Aditya
    WIRELESS PERSONAL COMMUNICATIONS, 2022, 127 (03) : 2021 - 2038
  • [47] An Enhanced Crow Search Inspired Feature Selection Technique for Intrusion Detection Based Wireless Network System
    Ashish Khanna
    Poonam Rani
    Puneet Garg
    Prakash Kumar Singh
    Aditya Khamparia
    Wireless Personal Communications, 2022, 127 (3) : 2021 - 2038
  • [48] Unsupervised Intrusion Detection Based on Asymmetric Auto-Encoder Feature Extraction
    Liu, Chunbo
    Wang, Liyin
    Zhang, Zhikai
    Xiang, Chunmiao
    Gu, Zhaojun
    Wang, Zhi
    Wang, Shuang
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2024, E107D (09) : 1161 - 1173
  • [49] An integrated Intrusion Detection Model using consistency based feature selection and LPBoost
    Thaseen, I. Sumaiya
    Kumar, Ch. Aswani
    PROCEEDINGS OF 2016 ONLINE INTERNATIONAL CONFERENCE ON GREEN ENGINEERING AND TECHNOLOGIES (IC-GET), 2016,
  • [50] Network anomaly intrusion detection CVM model based on PLS feature extraction
    Wu L.-Y.
    Li S.-L.
    Gan X.-S.
    Wang M.-H.
    Kongzhi yu Juece/Control and Decision, 2017, 32 (04): : 755 - 758