Intrusion Detection Based on Feature Transform Using Neural Network

作者: Wonil Kim , Se-Chang Oh , Kyoungro Yoon

DOI: 10.1007/978-3-540-24687-9_27

关键词:

摘要: In this paper, a novel method for intrusion detection is presented. The presented uses clustering based on the transformed features, which can enhance effectiveness of clustering. Clustering used in anomaly systems to separate attack and normal samples. general, separating samples original input space not an easy task. For better separation samples, transformation that maps data into different feature should be performed. we propose obtaining proper function reflects characteristics given domain. obtained from hidden layer trained three-layer neural network. Experiments over network connection records KDD CUP 1999 set are evaluate proposed method. result experiment clearly shows outstanding performance

参考文章(15)
Nong Ye, A Markov Chain Model of Temporal Behavior for Anomaly Detection information assurance and security. ,(2000)
Te-Won Lee, Independent component analysis: theory and applications Kluwer Academic Publishers. ,(1998)
Vern Paxson, Bro: a system for detecting network intruders in real-time Computer Networks. ,vol. 31, pp. 2435- 2463 ,(1999) , 10.1016/S1389-1286(99)00112-7
E Eskin, Andrew Arnold, Michael Prerau, Leonid Portnoy, Sal Stolfo, A GEOMETRIC FRAMEWORK FOR UNSUPERVISED ANOMALY DETECTION: DETECTING INTRUSIONS IN UNLABELED DATA APPLICATIONS OF DATA MINING IN COMPUTER SECURITY. pp. 0- 0 ,(2002) , 10.7916/D8D50TQT
Wenke Lee, S.J. Stolfo, K.W. Mok, A data mining framework for building intrusion detection models ieee symposium on security and privacy. pp. 120- 132 ,(1999) , 10.1109/SECPRI.1999.766909
Chilukuri K. Mohan, Kishan Mehrotra, Sanjay Ranka, Elements of artificial neural networks ,(1996)
E. Eskin, Wenke Lee, S.J. Stolfo, Modeling system calls for intrusion detection with dynamic window sizes darpa information survivability conference and exposition. ,vol. 1, pp. 165- 175 ,(2001) , 10.1109/DISCEX.2001.932213
J. B. Macqueen, Some methods for classification and analysis of multivariate observations Proceedings of the Fifth Berkeley Symposium on Mathematical Statistics and Probability, Volume 1: Statistics. ,vol. 1, pp. 281- 297 ,(1967)
R. Jagannathan, Ann Tamaru, Teresa F. Lunt, Caveh Jalali, Fred Gilham, Peter G. Neumann, IDES: A Progress Report ,(1990)
D.E. Denning, An Intrusion-Detection Model IEEE Transactions on Software Engineering. ,vol. 13, pp. 222- 232 ,(1987) , 10.1109/TSE.1987.232894