Analysis of KDD '99 Intrusion Detection Dataset for Selection of Relevance Features

作者: Adetunmbi A Olusola , Adeola S Oladele , Daramola O Abosede , None

DOI:

关键词:

摘要: The rapid development of business and other transaction systems over the Internet makes computer security a critical issue. In recent times, data mining machine learning have been subjected to extensive research in intrusion detection with emphasis on improving accuracy classifier. But selecting important features from input lead simplification problem, faster more accurate rates. this paper, we presented relevance each feature KDD '99 dataset class. Rough set degree dependency ratio class were employed determine most discriminating for Empirical results show that seven not relevant any network-based. former operates information collected within an individual system latter collect raw networks packets as source network analyze signs intrusions. two different techniques IDS search attack patterns are Misuse Anomaly. find known signatures monitored resources. Anomaly attacks by detecting changes pattern utilization or bahaviour system. Majority currently use either rule-based expert-system based. Their strengths depend largely ability personnel develops them. can only detect types is prone generation false positive alarms. This leads intelligence technique mining/machine alternative expensive strenuous human input. These automatically learn extract useful reference normal/attack traffic behaviour profile existing subsequent classification

参考文章(13)
Pavel Laskov, Patrick Düssel, Christin Schäfer, Konrad Rieck, Learning intrusion detection: supervised or unsupervised? international conference on image analysis and processing. pp. 50- 57 ,(2005) , 10.1007/11553595_6
Sanjay Rawat, V. P. Gulati, Arun K. Pujari, A Fast Host-Based Intrusion Detection System Using Rough Set Theory Transactions on Rough Sets IV. ,vol. 4, pp. 144- 161 ,(2005) , 10.1007/11574798_8
Lian-hua Zhang, Guan-hua Zhang, Lang Yu, Jie Zhang, Ying-cai Bai, Intrusion detection using rough set classification Journal of Zhejiang University Science. ,vol. 5, pp. 1076- 1086 ,(2004) , 10.1631/JZUS.2004.1076
Stefan Axelsson, The base-rate fallacy and its implications for the difficulty of intrusion detection computer and communications security. pp. 1- 7 ,(1999) , 10.1145/319709.319710
ByungRae Cha, KyungWoo Park, JaeHyun Seo, Neural network techniques for host anomaly intrusion detection using fixed pattern transformation international conference on computational science and its applications. pp. 254- 263 ,(2005) , 10.1007/11424826_27
S. Mukkamala, G. Janoski, A. Sung, Intrusion detection using neural networks and support vector machines international joint conference on neural network. ,vol. 2, pp. 1702- 1707 ,(2002) , 10.1109/IJCNN.2002.1007774
Ajith Abraham, Ravi Jain, Johnson Thomas, Sang Yong Han, None, D-SCIDS: distributed soft computing intrusion detection system Journal of Network and Computer Applications. ,vol. 30, pp. 81- 98 ,(2007) , 10.1016/J.JNCA.2005.06.001
A.H. Sung, S. Mukkamala, Identifying important features for intrusion detection using support vector machines and neural networks symposium on applications and the internet. pp. 209- 216 ,(2003) , 10.1109/SAINT.2003.1183050
Nahla Ben Amor, Salem Benferhat, Zied Elouedi, Naive Bayes vs decision trees in intrusion detection systems acm symposium on applied computing. pp. 420- 424 ,(2004) , 10.1145/967900.967989
Micheline Kamber, Jiawei Han, Data Mining: Concepts and Techniques (2nd edition) ,(2006)