Automated network feature weighting-based intrusion detection systems

作者: Dat Tran , Wanli Ma , Dharmendra Sharma

DOI: 10.1109/SYSOSE.2008.4724144

关键词: Feature (computer vision)Pattern recognitionData miningComputer scienceData modelingAnomaly-based intrusion detection systemFuzzy setVector quantizationArtificial intelligenceFeature extractionIntrusion detection systemWeighting

摘要: A common problem for network intrusion detection systems is that there are many available features describing traffic and feature values highly irregular with burst nature. Some such as octets transferred range several orders of magnitudes, from bytes to million bytes. The role depends on which pattern be detected: normal or intrusive one. Intrusion rates would better if we know more important a particular pattern. We therefore propose an automated weighting method based fuzzy subspace approach. Experimental results show the proposed can improve rates.

参考文章(19)
Philip K. Chan, Muhammad H. Arshad, Matthew V. Mahoney, A Machine Learning Approach to Anomaly Detection ,(2003)
Xiangyang Li, Nong Ye, Mining Normal and Intrusive Activity Patterns for Computer Intrusion Detection intelligence and security informatics. pp. 226- 238 ,(2004) , 10.1007/978-3-540-25952-7_17
Vern Paxson, Bro: a system for detecting network intruders in real-time Computer Networks. ,vol. 31, pp. 2435- 2463 ,(1999) , 10.1016/S1389-1286(99)00112-7
Eleazar Eskin, Anomaly Detection over Noisy Data using Learned Probability Distributions international conference on machine learning. pp. 255- 262 ,(2000) , 10.7916/D8C53SKF
Hongyu Yang, Feng Xie, Yi Lu, Clustering and Classification Based Anomaly Detection Fuzzy Systems and Knowledge Discovery. pp. 1082- 1091 ,(2006) , 10.1007/11881599_134
Joseph S. Sherif, Rod Ayers, Intrusion detection: methods and systems. Part II Information Management & Computer Security. ,vol. 11, pp. 222- 229 ,(2003) , 10.1108/09685220310500135
Carol Taylor, Jim Alves-Foss, NATE: Network Analysis of Anomalous Traffic Events, a low-cost approach new security paradigms workshop. pp. 89- 96 ,(2001) , 10.1145/508171.508186
Joseph S. Sherif, Rod Ayers, Tommy G. Dearmond, Intrusion detection: the art and the practice. Part I Information Management & Computer Security. ,vol. 11, pp. 175- 186 ,(2003) , 10.1108/09685220310489544
Carol Taylor, Jim Alves-Foss, An empirical analysis of NATE Proceedings of the 2002 workshop on New security paradigms - NSPW '02. pp. 18- 26 ,(2002) , 10.1145/844102.844106
Wenke Lee, Dong Xiang, Information-theoretic measures for anomaly detection ieee symposium on security and privacy. pp. 130- 143 ,(2001) , 10.1109/SECPRI.2001.924294