MLH-IDS: A Multi-Level Hybrid Intrusion Detection Method

作者: P. Gogoi , D. K. Bhattacharyya , B. Borah , J. K. Kalita

DOI: 10.1093/COMJNL/BXT044

关键词:

摘要: With the growth of networked computers and associated applications, intrusion detection has become essential to keeping networks secure. A number methods have been developed for protecting using conventional statistical as well data mining methods. Data misuse anomaly-based detection, usually encompass supervised, unsupervised outlier It is necessary that capabilities be updated with creation new attacks. This paper proposes a multi-level hybrid method uses combination outlierbased improving efficiency old The evaluated captured real-time flow packet dataset called Tezpur University system (TUIDS) dataset, distributed denial service benchmark knowledge discovery Cup 1999 version KDD (NSL-KDD) dataset. Experimental results are compared existing other classifiers. performance our very good.

参考文章(55)
Prasanta Gogoi, Monowar H. Bhuyan, D. K. Bhattacharyya, J. K. Kalita, Packet and Flow Based Network Intrusion Dataset international conference on contemporary computing. pp. 322- 334 ,(2012) , 10.1007/978-3-642-32129-0_34
Santosh Kumar, Sumit Kumar, Sukumar Nandi, Multi-density Clustering Algorithm for Anomaly Detection Using KDD’99 Dataset Advances in Computing and Communications. pp. 619- 630 ,(2011) , 10.1007/978-3-642-22709-7_60
Kalle Burbeck, Simin Nadjm-Tehrani, ADWICE – Anomaly Detection with Real-Time Incremental Clustering Lecture Notes in Computer Science. ,vol. 3506, pp. 407- 424 ,(2005) , 10.1007/11496618_30
Raymond T. Ng, Edwin M. Knorr, Algorithms for Mining Distance-Based Outliers in Large Datasets very large data bases. pp. 392- 403 ,(1998)
Christopher Leckie, Kingsly Leung, Unsupervised anomaly detection in network intrusion detection using clusters ACSC '05 Proceedings of the Twenty-eighth Australasian conference on Computer Science - Volume 38. ,vol. 38, pp. 333- 342 ,(2005)
Richard R. Muntz, Jiong Yang, Wei Wang, STING: A Statistical Information Grid Approach to Spatial Data Mining very large data bases. pp. 186- 195 ,(1997)
Wenke Lee, Salvatore J. Stolfo, Data mining approaches for intrusion detection usenix security symposium. pp. 6- 6 ,(1998) , 10.21236/ADA401496
Pedro Casas, Johan Mazel, Philippe Owezarski, UNADA: unsupervised network anomaly detection using sub-space outliers ranking NETWORKING'11 Proceedings of the 10th international IFIP TC 6 conference on Networking - Volume Part I. pp. 40- 51 ,(2011) , 10.1007/978-3-642-20757-0_4
Kevin Thompson, Pat Langley, and Wayne Iba, An analysis of Bayesian classifiers national conference on artificial intelligence. pp. 223- 228 ,(1992)