Novel Anomaly Intrusion Detection Using Neuro-Fuzzy Inference System

被引:0
作者
Kumar, K. S. Anil [1 ]
NandaMohan, V. [1 ]
机构
[1] Sree Ayyappa Coll, Alappuzha, Kerala, India
来源
INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY | 2008年 / 8卷 / 08期
关键词
Intrusion Detection System (IDS); Anomaly Detection; Neuro-Fuzzy; DARPA data set;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Conventional approaches to intrusion detection system pose a myriad of problems that exhibit serious impediments to the degree of configurability, extensibility, and effectiveness of the systems. The proposed methodology is a combination of three techniques comprising two machine-learning paradigms. K-Means Clustering, Fuzzy Logics and Neural Network techniques deployed to configure an effective intrusion detection system. Out of the several problems in the traditional techniques of Intrusion Detection Systems, the presence of high rate of false alerts causes unnecessary interference of human analyst. The human analysts in turn perform an intensive analysis repeatedly to distinguish the nature of such alerts and initiate sufficient actions. The approach proposed reveals the advantage of converging K-Means - Fuzzy - Neuro techniques to eliminate the preventable interference of human analyst in such occasions. The technique was tested using multitude of background knowledge sets in DARPA network traffic datasets. The experimental results render remarkable improvement in reducing the false alarms in addition to increased ability to capture intrusion packets that are no similar to the ones in the training datasets.
引用
收藏
页码:6 / 11
页数:6
相关论文
共 11 条
[1]   AN INTRUSION-DETECTION MODEL [J].
DENNING, DE .
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 1987, 13 (02) :222-232
[2]  
Ganesh Kumar P., 2007, INT C, P563
[3]  
Heady R., 1990, CS9020 U NEW MAX DEP
[4]  
Kumar S., 1994, CSDTR94013 PURD U
[5]  
Marimuthu A., 2008, 2008 6th International Symposium on Applied Machine Intelligence and Informatics (SAMI '08), P261, DOI 10.1109/SAMI.2008.4469180
[6]   A study on the modeling ability of the IDS method: A soft computing technique using pattern-based information processing [J].
Murakani, Masayuki ;
Honda, Nakaji .
INTERNATIONAL JOURNAL OF APPROXIMATE REASONING, 2007, 45 (03) :470-487
[7]  
Orfila A, 2003, IEEE INT CONF FUZZY, P1237
[8]   Modeling intrusion detection system using hybrid intelligent systems [J].
Peddabachigari, Sandhya ;
Abraham, Ajith ;
Grosan, Crina ;
Thomas, Johnson .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2007, 30 (01) :114-132
[9]  
RYAN J, 1998, ADV NEURAL INFORM PR, V10
[10]  
Terran lane Carla E., 1999, TEMPORAL SEQUENCE LE, V2, P295