An adaptive network intrusion detection approach for the cloud environment

作者: Hui-Hao Chou , Sheng-De Wang

DOI: 10.1109/CCST.2015.7389649

关键词:

摘要: As Internet attacks grow rapidly, firewalls or network intrusion systems are indispensable. Existing approaches usually use attack signatures, machine learning data mining algorithms to detect and stop anomaly malicious flow. Machine need a set of labeled train the detection model, while is not always available. In this paper, we proposed an approach that adaptive ever-changing environment. The constructs decision tree-based model for from unlabeled by using unsupervised algorithm called spectral clustering. And system can easily be deployed on cloud experiments with DARPA 2000 KDD Cup 1999 set, our shows notable improvement performance after adaptation procedure.

参考文章(26)
Vern Paxson, Bro: a system for detecting network intruders in real-time Computer Networks. ,vol. 31, pp. 2435- 2463 ,(1999) , 10.1016/S1389-1286(99)00112-7
William W. Cohen, Yoram Singer, A simple, fast, and effective rule learner national conference on artificial intelligence. pp. 335- 342 ,(1999)
Christopher Leckie, Kingsly Leung, Unsupervised anomaly detection in network intrusion detection using clusters ACSC '05 Proceedings of the Twenty-eighth Australasian conference on Computer Science - Volume 38. ,vol. 38, pp. 333- 342 ,(2005)
SHI ZHONG, TAGHI M. KHOSHGOFTAAR, NAEEM SELIYA, CLUSTERING-BASED NETWORK INTRUSION DETECTION International Journal of Reliability, Quality and Safety Engineering. ,vol. 14, pp. 169- 187 ,(2007) , 10.1142/S0218539307002568
L.L. DeLooze, Attack Characterization and Intrusion Detection using an Ensemble of Self-Organizing Maps international joint conference on neural network. pp. 2121- 2128 ,(2006) , 10.1109/IJCNN.2006.246983
Siddharth Gujral, Estefan Ortiz, Vassilis L. Syrmos, An unsupervised method for intrusion detection using spectral clustering 2009 IEEE Symposium on Computational Intelligence in Cyber Security. pp. 99- 106 ,(2009) , 10.1109/CICYBS.2009.4925096
Kleber Vieira, Alexandre Schulter, Carlos Becker Westphall, Carla Merkle Westphall, Intrusion Detection for Grid and Cloud Computing IT Professional. ,vol. 12, pp. 38- 43 ,(2010) , 10.1109/MITP.2009.89
Chunlin Zhang, Ju Jiang, Mohamed Kamel, Intrusion detection using hierarchical neural networks Pattern Recognition Letters. ,vol. 26, pp. 779- 791 ,(2005) , 10.1016/J.PATREC.2004.09.045
Joong-Hee Lee, Jong-Hyouk Lee, Seon-Gyoung Sohn, Jong-Ho Ryu, Tai-Myoung Chung, Effective Value of Decision Tree with KDD 99 Intrusion Detection Datasets for Intrusion Detection System international conference on advanced communication technology. ,vol. 2, pp. 1170- 1175 ,(2008) , 10.1109/ICACT.2008.4493974
Yang Zhong, Hirohumi Yamaki, Hiroki Takakura, A grid-based clustering for low-overhead anomaly intrusion detection network and system security. pp. 17- 24 ,(2011) , 10.1109/ICNSS.2011.6059955