Incremental Hybrid Intrusion Detection Using Ensemble of Weak Classifiers

作者: Amin Rasoulifard , Abbas Ghaemi Bafghi , Mohsen Kahani

DOI: 10.1007/978-3-540-89985-3_71

关键词:

摘要: In this paper, an incremental hybrid intrusion detection system is introduced. This combines misuse and anomaly detection. It can learn new classes of intrusions that do not exist in the training dataset for As framework has low computational complexity, it suitable real-time or on-line learning. Also experimental evaluations on KDD Cup are presented.

参考文章(21)
Debra Anderson, Thane Frivold, Alfonso Valdes, Next-generation Intrusion Detection Expert System (NIDES)A Summary ,(1997)
R. Heady, G. Luger, A. Maccabe, M. Servilla, The architecture of a network level intrusion detection system Other Information: PBD: 15 Aug 1990. ,(1990) , 10.2172/425295
Elvis Tombini, Hervé Debar, Ludovic Mé, Mireille Ducassé, A serial combination of anomaly and misuse IDSes applied to HTTP traffic annual computer security applications conference. pp. 428- 437 ,(2004) , 10.1109/CSAC.2004.4
Guan Jian, Liu Da-Xin, Cui Bin-Ge, An induction learning approach for building intrusion detection models using genetic algorithms world congress on intelligent control and automation. ,vol. 5, pp. 0- 0 ,(2004) , 10.1109/WCICA.2004.1342332
SHI ZHONG, TAGHI M. KHOSHGOFTAAR, NAEEM SELIYA, CLUSTERING-BASED NETWORK INTRUSION DETECTION International Journal of Reliability, Quality and Safety Engineering. ,vol. 14, pp. 169- 187 ,(2007) , 10.1142/S0218539307002568
Yoav Freund, Robert E Schapire, A Decision-Theoretic Generalization of On-Line Learning and an Application to Boosting conference on learning theory. ,vol. 55, pp. 119- 139 ,(1997) , 10.1006/JCSS.1997.1504
Christopher Krügel, Thomas Toth, Engin Kirda, Service specific anomaly detection for network intrusion detection acm symposium on applied computing. pp. 201- 208 ,(2002) , 10.1145/508791.508835
Robi Polikar, Lalita Upda, Satish S Upda, Vasant Honavar, Learn++: an incremental learning algorithm for supervised neural networks systems man and cybernetics. ,vol. 31, pp. 497- 508 ,(2001) , 10.1109/5326.983933
Filippo Neri, None, Comparing local search with respect to genetic evolution to detect intrusions in computer networks congress on evolutionary computation. ,vol. 1, pp. 238- 243 ,(2000) , 10.1109/CEC.2000.870301
K. Ilgun, R.A. Kemmerer, P.A. Porras, State transition analysis: a rule-based intrusion detection approach IEEE Transactions on Software Engineering. ,vol. 21, pp. 181- 199 ,(1995) , 10.1109/32.372146