Proceedings of the 15th Symposium on International Database Engineering &Amp; Applications - IDEAS '11 2011
DOI: 10.1145/2076623.2076647
|View full text |Cite
|
Sign up to set email alerts
|

An efficient local region and clustering-based ensemble system for intrusion detection

Abstract: The dramatic proliferation of sophisticated cyber attacks, in conjunction with the ever growing use of Internet-based services and applications, is nowadays becoming a great concern in any organization. Among many efficient security solutions proposed in the literature to deal with this evolving threat, ensemble approaches, a particular family of data mining, have proven very successful in designing high performance intrusion detection systems (IDSs) resting on the mutual combination of multiple classifiers. H… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
11
0

Year Published

2014
2014
2021
2021

Publication Types

Select...
4
2
2

Relationship

1
7

Authors

Journals

citations
Cited by 15 publications
(11 citation statements)
references
References 16 publications
0
11
0
Order By: Relevance
“…The clustering technique follows a simple rule; whenever the input network instances match one of the intrusion signatures, the system reacts to the security administrator concerning the possible threat in details, one of the limitations of proposed system is the paucity of extracted features, which is a lot less compared to the features in popular datasets such as UNSW-NB15, KDD99, and NSL-KDD datasets. Although various clustering techniques have been used for NADSs, the most utilized techniques for malicious detection are regular and co-clustering techniques using different strategies and processing methods [ 9 , 65 , 66 ]. For example, the K-means, as a regular clustering method, assembles features from the dataset instances, but co-clustering techniques concurrently consider both features and instances in the dataset to make clusters.…”
Section: Machine Learning Techniques For Network Malicious Behavior Detection and Recognitionmentioning
confidence: 99%
“…The clustering technique follows a simple rule; whenever the input network instances match one of the intrusion signatures, the system reacts to the security administrator concerning the possible threat in details, one of the limitations of proposed system is the paucity of extracted features, which is a lot less compared to the features in popular datasets such as UNSW-NB15, KDD99, and NSL-KDD datasets. Although various clustering techniques have been used for NADSs, the most utilized techniques for malicious detection are regular and co-clustering techniques using different strategies and processing methods [ 9 , 65 , 66 ]. For example, the K-means, as a regular clustering method, assembles features from the dataset instances, but co-clustering techniques concurrently consider both features and instances in the dataset to make clusters.…”
Section: Machine Learning Techniques For Network Malicious Behavior Detection and Recognitionmentioning
confidence: 99%
“…Most of the researchers are now days creating own customized dataset. Sources can be a heterogeneous in manner used for data collection [23]. Most of the sources can be log files, audit files, and packets entering in the network from various senders.…”
Section: Related Workmentioning
confidence: 99%
“…Methodology Classifiers [6] Supervised, Ensemble SVM, RF [12] Supervised, Ensemble SVM, KNN [13] Supervised, Ensemble RF, j48 [14] Supervised, DT [15] Supervised, Ensemble Multiple SVM [16] Supervised, Ensemble ANN, SVM, DT, KNN [17] Ensemble SVM, weighted majority, KNN [19] Ensemble K means and SVM [20] Supervised, Ensemble RF [21] Supervised, Ensemble Clustering, SVM [22] Supervised, Ensemble BIRCH, SVM [23] Semi-Supervised DT, weighted mean and k means clustering…”
Section: Numbermentioning
confidence: 99%
“…Using a hybrid (combine different data mining methods) approach is very interesting because it takes care about alert management [7] [8]. H.Nguyen et al [9] use an ensemble system of classifiers, called CBE based on K-mean algorithm but the classe number must be fixed a priori [10]. This may take time depending on the number of servers to be monitored.…”
Section: B Data Mining-based Idssmentioning
confidence: 99%