{"title":"A Fast Probing Detection Method using Hybrid Machine Learning Algorithms","authors":"Sung-Kwan Youm, Eui-Jik Kim","doi":"10.1145/3323679.3326615","DOIUrl":null,"url":null,"abstract":"Recently, a malicious user breaks into the network and destroys the entire network. This attack starts from probing. In this paper, we propose a fast probing detection technique for intrusion detection. In the past, probing detection was performed by analyzing all collected traffic characteristics and by supervised learning. In the proposed method, a normal traffic is classified through unsupervised learning and intrusion detection for probing attack is not performed for that traffic. The supervised learning is performed on traffic that may be abnormal. So, through the simulation, we verify that the proposed method can reduce times than the conventional method.","PeriodicalId":205641,"journal":{"name":"Proceedings of the Twentieth ACM International Symposium on Mobile Ad Hoc Networking and Computing","volume":"31 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the Twentieth ACM International Symposium on Mobile Ad Hoc Networking and Computing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3323679.3326615","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Recently, a malicious user breaks into the network and destroys the entire network. This attack starts from probing. In this paper, we propose a fast probing detection technique for intrusion detection. In the past, probing detection was performed by analyzing all collected traffic characteristics and by supervised learning. In the proposed method, a normal traffic is classified through unsupervised learning and intrusion detection for probing attack is not performed for that traffic. The supervised learning is performed on traffic that may be abnormal. So, through the simulation, we verify that the proposed method can reduce times than the conventional method.