Some similarity coefficients and application of data mining techniques to the anomaly-based IDS

被引:0
|
作者
Evgeniya Nikolova
Veselina Jecheva
机构
[1] Burgas Free University,Faculty for Computer Science and Engineering
来源
Telecommunication Systems | 2012年 / 50卷
关键词
Intrusion detection; Anomaly-based IDS; Data mining; Classification tree; Similarity coefficients;
D O I
暂无
中图分类号
学科分类号
摘要
This paper introduces an approach to anomaly-based intrusion detection, which searches the system activity data for deviations from preliminarily described profiles of normal activity. The normal system activity in the proposed methodology is described using data mining techniques, namely classification trees. The intrusion detection is performed using some similarity coefficients with a purpose to measure the similarity between the normal activity and the current one. The evaluation of the represented simulation results indicates the proposed methodology produces reliable and steady results.
引用
收藏
页码:127 / 135
页数:8
相关论文
共 50 条
  • [1] Some similarity coefficients and application of data mining techniques to the anomaly-based IDS
    Nikolova, Evgeniya
    Jecheva, Veselina
    TELECOMMUNICATION SYSTEMS, 2012, 50 (02) : 127 - 135
  • [2] Anomaly-based IDS Implementation in Cloud Environment using BOAT Algorithm
    Vaid, Chetna
    Verma, Harsh K.
    2014 3RD INTERNATIONAL CONFERENCE ON RELIABILITY, INFOCOM TECHNOLOGIES AND OPTIMIZATION (ICRITO) (TRENDS AND FUTURE DIRECTIONS), 2014,
  • [3] I See Syscalls by the Seashore: An Anomaly-based IDS for Containers Leveraging Sysdig Data
    Frasao, Anderson
    Heinrich, Tiago
    Fulber-Garcia, Vinicius
    Will, Newton C.
    Obelheiro, Rafael R.
    Maziero, Carlos A.
    2024 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS, ISCC 2024, 2024,
  • [4] A Cross-Layer, Anomaly-Based IDS for WSN and MANET
    Amouri, Amar
    Morgera, Salvatore D.
    Bencherif, Mohamed A.
    Manthena, Raju
    SENSORS, 2018, 18 (02):
  • [5] Accelerating anomaly-based IDS using Neural Network on GPU
    Nguyen Thi Thanh Van
    Tran Ngoc Thinh
    2015 INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING AND APPLICATIONS (ACOMP), 2015, : 67 - 74
  • [6] Smart home anomaly-based IDS: Architecture proposal and case study
    Lara, Agustin
    Mayor, Vicente
    Estepa, Rafael
    Estepa, Antonio
    Diaz-Verdejo, Jesus E.
    INTERNET OF THINGS, 2023, 22
  • [7] The Key Techniques of the Network Anomaly Detection Based on Data Mining
    He Xiaobo
    PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS RESEARCH AND MECHATRONICS ENGINEERING, 2015, 121 : 1896 - 1899
  • [8] Evaluation of anomaly-based IDS for mobile devices using machine learning classifiers
    Damopoulos, Dimitrios
    Menesidou, Sofia A.
    Kambourakis, Georgios
    Papadaki, Maria
    Clarke, Nathan
    Gritzalis, Stefanos
    SECURITY AND COMMUNICATION NETWORKS, 2012, 5 (01) : 3 - 14
  • [9] Passban IDS: An Intelligent Anomaly-Based Intrusion Detection System for IoT Edge Devices
    Eskandari, Mojtaba
    Janjua, Zaffar Haider
    Vecchio, Massimo
    Antonelli, Fabio
    IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (08): : 6882 - 6897
  • [10] A survey of data mining and social network analysis based anomaly detection techniques
    Kaur, Ravneet
    Singh, Sarbjeet
    EGYPTIAN INFORMATICS JOURNAL, 2016, 17 (02) : 199 - 216