Selection of effective network parameters in attacks for intrusion detection

作者: Gholam Reza Zargar , Peyman Kabiri

DOI: 10.1007/978-3-642-14400-4_50

关键词:

摘要: Current Intrusion Detection Systems (IDS) examine a large number of data features to detect intrusion or misuse patterns. Some the may be redundant with little contribution detection process. The purpose this study is identify important input in building an IDS that are computationally efficient and effective. This paper proposes investigates selection effective network parameters for detecting intrusions extracted from Tcpdump DARPA1998 dataset. Here PCA method used determine optimal feature set. An appropriate set helps build decision model as well reduce population Feature reduction will speed up training testing process attack identification system considerably. dataset was experiments test data. Experimental results indicate time while maintaining accuracy within tolerable range.

参考文章(19)
Andrew H. Sung, Srinivas Mukkamala, The feature selection and intrusion detection problems Lecture Notes in Computer Science. pp. 468- 482 ,(2004) , 10.1007/978-3-540-30502-6_34
Rakesh Agrawal, Johannes Gehrke, Dimitrios Gunopulos, Prabhakar Raghavan, Automatic subspace clustering of high dimensional data for data mining applications Proceedings of the 1998 ACM SIGMOD international conference on Management of data - SIGMOD '98. ,vol. 27, pp. 94- 105 ,(1998) , 10.1145/276304.276314
A. Hassan, M. Shariff Nabi Baksh, A. M. Shaharoun, H. Jamaluddin, Improved SPC chart pattern recognition using statistical features International Journal of Production Research. ,vol. 41, pp. 1587- 1603 ,(2003) , 10.1080/0020754021000049844
Wenke Lee, Salvatore J. Stolfo, A framework for constructing features and models for intrusion detection systems ACM Transactions on Information and System Security. ,vol. 3, pp. 227- 261 ,(2000) , 10.1145/382912.382914
Gholam Reza Zargar, Peyman Kabiri, Identification of effective network features for probing attack detection networked digital technologies. pp. 392- 397 ,(2009) , 10.1109/NDT.2009.5272124
Srilatha Chebrolu, Ajith Abraham, Johnson P Thomas, None, Feature deduction and ensemble design of intrusion detection systems Computers & Security. ,vol. 24, pp. 295- 307 ,(2005) , 10.1016/J.COSE.2004.09.008
Amin Hassanzadeh, Babak Sadeghian, Intrusion Detection with Data Correlation Relation Graph availability, reliability and security. pp. 982- 989 ,(2008) , 10.1109/ARES.2008.119
Isabelle Guyon, André Elisseeff, An introduction to variable and feature selection Journal of Machine Learning Research. ,vol. 3, pp. 1157- 1182 ,(2003) , 10.1162/153244303322753616
A.H. Sung, S. Mukkamala, Identifying important features for intrusion detection using support vector machines and neural networks symposium on applications and the internet. pp. 209- 216 ,(2003) , 10.1109/SAINT.2003.1183050