Mining network data stream for intrusion detection through combining SVMs with Selective K-Medoids and StreamKM++ clustering algorithms

سال انتشار: 1393
نوع سند: مقاله کنفرانسی
زبان: انگلیسی
مشاهده: 861

فایل این مقاله در 10 صفحه با فرمت PDF قابل دریافت می باشد

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این مقاله:

شناسه ملی سند علمی:

ICCEIT01_072

تاریخ نمایه سازی: 1 آذر 1394

چکیده مقاله:

Every day, huge volumes of network data are continuously generated as streams, which need to be analyzed online as they arrive. Streaming data can be considered as one of the main sources of what is called big data. Mining data streams and big data have received a lot of attention over the last decade. Beside the precautionary operations used for achieving security in communication networks, intrusion detection is one of the most essential things for security infrastructures in network environments, and it is widely used in detecting, identifying and tracking the intruders. Capabilities of intrusion detection technologies have great importance with the performance of intrusion detection system (IDS). Many IDS has been designed and implemented using various techniques like data mining approches. This paper investigates the problem of existing normal data mining Techniques which is not efficient enough for mining network data stream for intrusion detection.In this paper, we introduce a new hybrid machine learning classification algorithm to classify data stream that is applied to real-time network intrusion detection. Our new approach combines supervised learning and unsupervised learning methods to take the advantages of both while avoiding their weaknesses. This paper proposes a new hybrid classification algorithm which incrementaly models a data stream. In the proposed algorithm, k-clustering approaches collaborate directly with SVMs to reduce training time and increase detection accuracy. Our algorithm is implemented in java platform and evaluated using a standard benchmark NSL-KDD data set that is new version of KDD99. The experimental results show that the proposed intrusion detection algorithm performs high predictive detection accuracy and fast running time.

نویسندگان

Ziaeddin Najafian

Computer Engineering Department Central Tehran Branch, Islamic Azad University

Alireza Hedayati

Computer Engineering DepartmentCentral Tehran Branch, Islamic AzadUniversityTehran,Iran

مراجع و منابع این مقاله:

لیست زیر مراجع و منابع استفاده شده در این مقاله را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود مقاله لینک شده اند :
  • W. Lee, S.J. Stolfo, K.W. Mok, A data mining framework ...
  • Bhuyan, M.H.; Bhattacharyya, D.K.; Kalita, J.K., "Network ...
  • G. Krempl, Indre, liobaite, D. Brzezi, et al, "Open challenges ...
  • P. Rai, H. Daum, and S. v enkatasubraman ian, "Streamed ...
  • P. Corsini, B. Lazzerini, and F. Marcelloni, "Combining supervised _ ...
  • S. R. Gaddam, V. V. Phoha, and K. S. Balagani, ...
  • C.-F. Tsai, Y.-F. Hsu, C.-Y. Lin, and W.-Y. Lin, "Intrusion ...
  • M. Y. Su, G. J. Yu, and C. Y. Lin, ...
  • L. Khan, M. Awad, and B. Thuraisingham, "A New Intrusion ...
  • S.-J. Horng, M.-Y. Su, Y.-H. Chen, T.-W. Kao, R.-J. Chen, ...
  • _ _ _ _ _ networks, " Future Generation Computer ...
  • First internal conference _ Computer Engineering and Information Technology Islamic ...
  • _ _ _ _ _ _ Algorithmics, vol. 17, pp. ...
  • _ _ _ Algorithms, pp. 1027-1035, 2007. ...
  • C. Cortes and V. Vapnik, "Support-vector networks, " Machine Learning, ...
  • A. Bordes, S. Ertekin, J. Weston, and L. Bottou, "Fast ...
  • _ _ _ on: A fast algorithm o ...
  • M. Hall, E. Frank, G. Holmes, B. Pfahringer, P. Reutemann, ...
  • Lincoln Laboratory, MIT, Intrusion detection attacks database, 2009 .http ://www. ...
  • M. Tavallaee, E. Bagheri, W. Lu, and A. Ghorbani, "A ...
  • UCI KDD Archive, KDD Cup 1999 data, http :/kdd _ ...
  • N. C.N. Chu, A. Williams, R. Alhajj, and K. Barker ...
  • _ _ _ _ in Information Security. vol. 4176, S. ...
  • Zhu Lin; Zhu Can-Shi, "Research into the network security model ...
  • Kumar, M.; H anumanthappa, M., "Intrusion detection system using stream ...
  • S. Guha, A. Meyerson, N. Mishra, R. Motwani, and L. ...
  • P. Kranen, H. Kremer, T. Jansen, T. Seidl, A. Bifet, ...
  • X. Zhou, Y.-S. Moon, R. Unland, and J. Yoo, Eds., ...
  • T. Zhang, R. Ramakrishnan, and M. Livny. , "BIRCH: A ...
  • نمایش کامل مراجع