Anomaly Intrusion Detection System Using Hierarchical Gaussian Mixture Model

被引:0
作者
Bahrololum, M. [1 ]
Khaleghi, M. [1 ]
机构
[1] Iran Telecommun Res Ctr, POB 14155-3961, Tehran, Iran
来源
INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY | 2008年 / 8卷 / 08期
关键词
Intrusion Detection System; Hierarchical Gaussian Mixture Model; Anomaly detection;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Intrusion Detection Systems have been widely used to overcome security threats in computer networks and to identify unauthorized use, misuse, and abuse of computer systems. Anomaly-based approaches in Intrusion Detection Systems have the advantage of being able to detect unknown attacks; they look for patterns that deviate from the normal behavior. In this paper we proposed Hierarchical Gaussian Mixture Model (HGMM) a novel type of Gaussian Mixture which detects network based attacks as anomalies using statistical preprocessing classification. This method learns patterns of normal and intrusive activities to classify that use a set of Gaussian probability distribution functions. The use of Maximum likelihood in detection phase has used the deviation between current and reference behavior. HGMM is evaluated by dataset KDD99 without any special hardware requirements. We compare it with six classification techniques; Gaussian Mixture, Radial Basis Function, Binary Tree Classifier, SOM, ART and LAMSTAR to verify its feasibility and effectiveness. Experimental results show that this method is able to reducing the missing alarm, and can accurately predict probable attack behavior in IDS.
引用
收藏
页码:264 / 271
页数:8
相关论文
共 9 条
  • [1] GHOSH A, 1999, LEARNING PROGRAM BEH
  • [2] Ghosh Anup K., 1999, P 8 SENIX SEC S WASH, P131
  • [3] LIN H, 2006, SECURE EFFICIENT MOD
  • [4] Lincoln Laboratory Massachusetts Institute of Technology (MIT), 1998, MASS I TECHN
  • [5] Intrusion detection using neural networks and support vector machines
    Mukkamala, S
    Janoski, G
    Sung, A
    [J]. PROCEEDING OF THE 2002 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS, VOLS 1-3, 2002, : 1702 - 1707
  • [6] Ohn Mar San, 2004, International Journal of Applied Mathematics and Computer Science, V14, P241
  • [7] Speaker verification using adapted Gaussian mixture models
    Reynolds, DA
    Quatieri, TF
    Dunn, RB
    [J]. DIGITAL SIGNAL PROCESSING, 2000, 10 (1-3) : 19 - 41
  • [8] SINGH G, 2003, VECTOR QUANTIZATION
  • [9] Venkatachalam V., 2007, IJCSNS INT J COMPUTE, V7