首页> 外文会议> >A Robust Feature Normalization Scheme and an Optimized Clustering Method for Anomaly-Based Intrusion Detection System
【24h】

A Robust Feature Normalization Scheme and an Optimized Clustering Method for Anomaly-Based Intrusion Detection System

机译:基于异常的入侵检测系统的鲁棒特征归一化方案和优化聚类方法

获取原文
获取原文并翻译 | 示例

摘要

Intrusion detection system(IDS) has played a central role as an appliance to effectively defend our crucial computer systems or networks against attackers on the Internet. Traditional IDSs employ signature-based methods or anomaly-based methods which rely on labeled training data. However, they have several problems, for example, it consumes huge amounts of cost and time to acquire the labeled training data, and they often experienced difficulty in detecting new types of attack. In order to cope with the problems, many researchers have proposed various kinds of algorithms for several years. Although they do not require labeled data for training and have the capability to detect unforeseen attacks, they are based on the assumption that the ratio of attack to normal is extremely small. However, the assumption may not be satisfied in a realistic situation because some attacks, most notably the denial-of-service attacks, consist of a large number of simultaneous connections. Consequently if the assumption fails, the performance of the algorithm will deteriorate. In this paper, we present a new normalization and clustering method that can overcome a limitation on the attack ratio of the training data. We evaluated our method using KDD Cup 1999 data set. Evaluation results show that performance of our approach is constant irrespective of an increase in the attack ratio.
机译:入侵检测系统(IDS)作为一种设备发挥了重要作用,可以有效地保护我们的关键计算机系统或网络免受Internet攻击。传统的IDS采用依赖签名的训练数据的基于签名的方法或基于异常的方法。但是,它们有几个问题,例如,获取标记的训练数据会花费大量成本和时间,并且在检测新型攻击方面通常会遇到困难。为了解决这些问题,几年来许多研究人员提出了各种算法。尽管它们不需要训练的标记数据并且具有检测意外攻击的能力,但是它们基于的假设是攻击与正常的比率非常小。但是,由于某些攻击(最主要是拒绝服务攻击)由大量同时连接组成,因此在现实情况下可能无法满足该假设。因此,如果假设失败,算法的性能将下降。在本文中,我们提出了一种新的归一化和聚类方法,可以克服训练数据的攻击率的限制。我们使用KDD Cup 1999数据集评估了我们的方法。评估结果表明,我们的方法的性能是恒定的,而不管攻击率如何提高。

著录项

  • 来源
    《》|2007年|140-151|共12页
  • 会议地点 Bangkok(TH)
  • 作者单位

    Graduate School of Informatics, Kyoto University;

    Academic Center for Computing and Media Studies, Kyoto University;

    Information and Telecom. Eng., Hankuk Aviation University;

  • 会议组织
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类 TP311.13;
  • 关键词

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号