数据挖掘在特征约简入侵检测中的应用实验分析

Nazmul Shahadat, Imam Hossain, A. Rohman, Nawshi Matin
{"title":"数据挖掘在特征约简入侵检测中的应用实验分析","authors":"Nazmul Shahadat, Imam Hossain, A. Rohman, Nawshi Matin","doi":"10.1109/ECACE.2017.7912907","DOIUrl":null,"url":null,"abstract":"As tremendous growth of information in the internet, the importance of Network security also dramatically increases. Network and Host based Intrusion Detection System (IDS) are two primary systems in Network Security infrastructure. When new intrusion types are appeared in Network or Host, some serious problems are also appeared to detect these new intrusions. Due to this reason, IDSs demanded better than Signature based detection. The action of intrusion is represented by some features and collects the corresponding featured data from these uncertain feature characteristics. In last two decades, several techniques are developed to detect intrusion by using these data as human labeling which is very time consuming and expensive process. In this paper, we proposed a data mining rule based algorithm called Decision Table (DT) to detect intrusion and a new feature selection process to remove irrelevant/correlated features simultaneously. An empirical analysis on KDD'99 cup dataset was performed by using our proposed and some other existence feature selection techniques with DT and some others classification algorithms. The experimental results showed that proposed approach provides better performance in accuracy and cost compared among Bayesian Network, Naïve Bayes Classifier and other developed algorithms with data mining KDD'99 cup challenge in all cases.","PeriodicalId":333370,"journal":{"name":"2017 International Conference on Electrical, Computer and Communication Engineering (ECCE)","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"13","resultStr":"{\"title\":\"Experimental analysis of data mining application for intrusion detection with feature reduction\",\"authors\":\"Nazmul Shahadat, Imam Hossain, A. Rohman, Nawshi Matin\",\"doi\":\"10.1109/ECACE.2017.7912907\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"As tremendous growth of information in the internet, the importance of Network security also dramatically increases. Network and Host based Intrusion Detection System (IDS) are two primary systems in Network Security infrastructure. When new intrusion types are appeared in Network or Host, some serious problems are also appeared to detect these new intrusions. Due to this reason, IDSs demanded better than Signature based detection. The action of intrusion is represented by some features and collects the corresponding featured data from these uncertain feature characteristics. In last two decades, several techniques are developed to detect intrusion by using these data as human labeling which is very time consuming and expensive process. In this paper, we proposed a data mining rule based algorithm called Decision Table (DT) to detect intrusion and a new feature selection process to remove irrelevant/correlated features simultaneously. An empirical analysis on KDD'99 cup dataset was performed by using our proposed and some other existence feature selection techniques with DT and some others classification algorithms. The experimental results showed that proposed approach provides better performance in accuracy and cost compared among Bayesian Network, Naïve Bayes Classifier and other developed algorithms with data mining KDD'99 cup challenge in all cases.\",\"PeriodicalId\":333370,\"journal\":{\"name\":\"2017 International Conference on Electrical, Computer and Communication Engineering (ECCE)\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-02-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"13\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2017 International Conference on Electrical, Computer and Communication Engineering (ECCE)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ECACE.2017.7912907\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 International Conference on Electrical, Computer and Communication Engineering (ECCE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ECACE.2017.7912907","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 13

摘要

随着互联网信息的巨大增长,网络安全的重要性也急剧增加。基于网络的入侵检测系统和基于主机的入侵检测系统是网络安全基础设施中的两个主要系统。当网络或主机中出现新的入侵类型时,检测这些新的入侵也会出现一些严重的问题。因此,入侵防御者需要比基于签名的检测更好的检测方法。入侵行为用一些特征来表示,并从这些不确定特征特征中收集相应的特征数据。近二十年来,人们开发了几种利用这些数据作为人工标记来检测入侵的技术,这是一个非常耗时和昂贵的过程。本文提出了一种基于数据挖掘规则的决策表(DT)算法来检测入侵,并提出了一种新的特征选择过程来同时去除无关/相关的特征。利用本文提出的存在特征选择技术和DT分类算法对KDD'99 cup数据集进行了实证分析。实验结果表明,在所有情况下,与贝叶斯网络、Naïve贝叶斯分类器和其他开发的数据挖掘KDD'99 cup挑战算法相比,该方法在准确率和成本上都有更好的表现。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Experimental analysis of data mining application for intrusion detection with feature reduction
As tremendous growth of information in the internet, the importance of Network security also dramatically increases. Network and Host based Intrusion Detection System (IDS) are two primary systems in Network Security infrastructure. When new intrusion types are appeared in Network or Host, some serious problems are also appeared to detect these new intrusions. Due to this reason, IDSs demanded better than Signature based detection. The action of intrusion is represented by some features and collects the corresponding featured data from these uncertain feature characteristics. In last two decades, several techniques are developed to detect intrusion by using these data as human labeling which is very time consuming and expensive process. In this paper, we proposed a data mining rule based algorithm called Decision Table (DT) to detect intrusion and a new feature selection process to remove irrelevant/correlated features simultaneously. An empirical analysis on KDD'99 cup dataset was performed by using our proposed and some other existence feature selection techniques with DT and some others classification algorithms. The experimental results showed that proposed approach provides better performance in accuracy and cost compared among Bayesian Network, Naïve Bayes Classifier and other developed algorithms with data mining KDD'99 cup challenge in all cases.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信