首页> 外文期刊>Frontiers of computer science in China >Local outlier factor and stronger one class classifier based hierarchical model for detection of attacks in network intrusion detection dataset
【24h】

Local outlier factor and stronger one class classifier based hierarchical model for detection of attacks in network intrusion detection dataset

机译:用于检测网络入侵检测数据集中攻击的局部离群因素和基于强一类分类器的层次模型

获取原文
获取原文并翻译 | 示例
       

摘要

Identification of attacks by a network intrusion detection system (NIDS) is an important task. In signature or rule based detection, the previously encountered attacks are modeled, and signatures/rules are extracted. These rules are used to detect such attacks in future, but in anomaly or outlier detection system, the normal network traffic is modeled. Any deviation from the normal model is deemed to be an outlier/attack. Data mining and machine learning techniques are widely used in offline NIDS. Unsupervised and supervised learning techniques differ the way NIDS dataset is treated. The characteristic features of unsupervised and supervised learning are finding patterns in data, detecting outliers, and determining a learned function for input features, generalizing the data instances respectively. The intuition is that if these two techniques are combined, better performance may be obtained. Hence, in this paper the advantages of unsupervised and supervised techniques are inherited in the proposed hierarchical model and devised into three stages to detect attacks in NIDS dataset. NIDS dataset is clustered using Dirichlet process (DP) clustering based on the underlying data distribution. Iteratively on each cluster, local denser areas are identified using local outlier factor (LOF) which in turn is discretized into four bins of separation based on LOF score. Further, in each bin the normal data instances are modeled using one class classifier (OCC). A combination of Density Estimation method, Reconstruction method, and Boundary methods are used for OCC model. A product rule combination of the three methods takes into consideration the strengths of each method in building a stronger OCC model. Any deviation from this model is considered as an attack. Experiments are conducted on KDD CUP'99 and SSENet-2011 datasets. The results show that the proposed model is able to identify attacks with higher detection rate and low false alarms.
机译:网络入侵检测系统(NIDS)识别攻击是一项重要任务。在基于签名或规则的检测中,对先前遇到的攻击进行建模,并提取签名/规则。这些规则用于将来检测此类攻击,但在异常或异常检测系统中,将对正常网络流量进行建模。与正常模型的任何偏差均被视为异常值/攻击。数据挖掘和机器学习技术广泛用于离线NIDS。无监督和有监督的学习技术对待NIDS数据集的方式有所不同。无监督学习和无监督学习的特征是在数据中查找模式,检测异常值并确定输入特征的学习功能,分别概括数据实例。直觉是,如果将这两种技术结合在一起,则可以获得更好的性能。因此,本文提出的分层模型继承了无监督和监督技术的优点,并将其分为三个阶段来检测NIDS数据集中的攻击。基于基础数据分布,使用Dirichlet过程(DP)聚类对NIDS数据集进行聚类。在每个聚类上,使用局部离群因子(LOF)迭代地确定局部密集区域,然后根据LOF分数将其离散化为四个分离区。此外,在每个仓中,使用一个类分类器(OCC)对正常数据实例进行建模。 OCC模型使用密度估计方法,重建方法和边界方法的组合。三种方法的乘积规则组合考虑了每种方法在建立更强大的OCC模型中的优势。与该模型的任何偏差均视为攻击。在KDD CUP'99和SSENet-2011数据集上进行了实验。结果表明,该模型能够识别出具有较高检测率和较低虚警率的攻击。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号