Earticle

현재 위치 Home

A Novel Lightweight Hybrid Intrusion Detection Method Using a Combination of Data Mining Techniques

첫 페이지 보기
  • 발행기관
    보안공학연구지원센터(IJSIA) 바로가기
  • 간행물
    International Journal of Security and Its Applications SCOPUS 바로가기
  • 통권
    Vol.9 No.4 (2015.04)바로가기
  • 페이지
    pp.91-106
  • 저자
    Jatuphum Juanchaiyaphum, Ngamnij Arch-int, Somjit Arch-int, Saiyan Saiyod
  • 언어
    영어(ENG)
  • URL
    https://www.earticle.net/Article/A245513

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

원문정보

초록

영어
Hybrid intrusion detection systems that make use of data mining techniques, in order to improve effectiveness, have been actively pursued in the last decade. However, their complexity to build detection models has become very expensive when confronted with large-scale datasets, making them unviable for real-time retraining. In order to overcome the limitation of the conventional hybrid method, we propose a new lightweight hybrid intrusion detection method that consists of a combination of feature selection, clustering and classification. According to our hypothesis that there are different natures of attack events in each of network protocols, the proposed method examines each of network protocol data separately, but their processes are the same. First, the training dataset is divided into training subsets, depending on their type of network protocol. Next, each training subset is reduced dimensionally by eliminating the irrelevant and redundant features throughout the feature selection process; and then broken down into disjointed regions, depending on their similar feature values, by K -Means clustering. Lastly, the C4.5 decision tree is used to build multiple misuse detection models for suspicious regions, which deviate from the normal and anomaly regions. As a result, each detection model is built from high-quality data, which are less complex and consist of relevant data. For better understanding of the enhanced performance, the proposed method was evaluated through experiments using the NSL-KDD dataset. The experimental results indicate that the proposed method is better in terms of effectiveness (F-value: 0.9957, classification accuracy: 99.52%, false positive rate: 0.26%), and efficiency (the training and testing times of the proposed method are approximately 33% and 25%, respectively, of the time required for its comparison) than the conventional hybrid method using the same algorithm.

목차

Abstract
 1. Introduction
 2. Related Works
 3. Proposed Lightweight Hybrid Intrusion Detection Method
  3.1. PreprocessingModule
  3.2. Anomaly Detection Module
  3.3. Misuse Detection Module
 4. Experimental Results
  4.1. Dataset
  4.2. Performance Metrics
  4.3. Results and Discussion
 5. Conclusion
 References

키워드

Hybrid intrusion detection K-Means clustering Decision tree Feature selection

저자

  • Jatuphum Juanchaiyaphum [ Semantic Mining Information Integration Laboratory (SMIIL) ]
  • Ngamnij Arch-int [ Semantic Mining Information Integration Laboratory (SMIIL) ]
  • Somjit Arch-int [ Semantic Mining Information Integration Laboratory (SMIIL) ]
  • Saiyan Saiyod [ Hardware-Human Interface and Communications Laboratory (H2I-Comm) Computer Science Department, Science Faculty, Khon Kaen University Khon Kaen, 40002, Thailand ]

참고문헌

자료제공 : 네이버학술정보

간행물 정보

발행기관

  • 발행기관명
    보안공학연구지원센터(IJSIA) [Science & Engineering Research Support Center, Republic of Korea(IJSIA)]
  • 설립연도
    2006
  • 분야
    공학>컴퓨터학
  • 소개
    1. 보안공학에 대한 각종 조사 및 연구 2. 보안공학에 대한 응용기술 연구 및 발표 3. 보안공학에 관한 각종 학술 발표회 및 전시회 개최 4. 보안공학 기술의 상호 협조 및 정보교환 5. 보안공학에 관한 표준화 사업 및 규격의 제정 6. 보안공학에 관한 산학연 협동의 증진 7. 국제적 학술 교류 및 기술 협력 8. 보안공학에 관한 논문지 발간 9. 기타 본 회 목적 달성에 필요한 사업

간행물

  • 간행물명
    International Journal of Security and Its Applications
  • 간기
    격월간
  • pISSN
    1738-9976
  • 수록기간
    2008~2016
  • 등재여부
    SCOPUS
  • 십진분류
    KDC 505 DDC 605

이 권호 내 다른 논문 / International Journal of Security and Its Applications Vol.9 No.4

    피인용수 : 0(자료제공 : 네이버학술정보)

    함께 이용한 논문 이 논문을 다운로드한 분들이 이용한 다른 논문입니다.

      페이지 저장