KDD Cup 1999数据集上用户到根和远程到本地网络入侵检测的自组织特征映射

Ryan Wilson, C. Obimbo
{"title":"KDD Cup 1999数据集上用户到根和远程到本地网络入侵检测的自组织特征映射","authors":"Ryan Wilson, C. Obimbo","doi":"10.1109/WORLDCIS17046.2011.5749879","DOIUrl":null,"url":null,"abstract":"The problem of network intrusion detection is one that is ever-changing, ever-evolving, and is always in need of improvement. Society-at-large relies on computer networks everyday for tasks ranging from online banking to e-commerce, social networking, news, gambling, and just about anything else. As such, society demands that these networks remain secure. In order to maintain security the systems used to protect these networks, which are vital to the 21st century world, must be constantly updated. The task of creating a system for the 21st century fell upon several groups for the ACM 1999 KDD Cup Competition. The competition produced a winning entry, but something was lacking: The winning team's results for two of the intrusion types, User-to-Root and Remote-to-Local, were subpar at best. The winning team produced a 13.8% and 8.4% detection rate for these types respectively, compared to over 90% for each of the Denial of Service and Probing intrusion types. This research aimed to rectify this shortcoming. By implementing an unsupervised learning system, this research has produced a system that correctly detects 62.8% of User-to-Root attacks within the same dataset, with minimal false positives, while maintaining the high detection rates of Denial of Service and Probing attacks.","PeriodicalId":204568,"journal":{"name":"2011 World Congress on Internet Security (WorldCIS-2011)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2011-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"12","resultStr":"{\"title\":\"Self-organizing feature maps for User-to-Root and Remote-to-Local network intrusion detection on the KDD Cup 1999 dataset\",\"authors\":\"Ryan Wilson, C. Obimbo\",\"doi\":\"10.1109/WORLDCIS17046.2011.5749879\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The problem of network intrusion detection is one that is ever-changing, ever-evolving, and is always in need of improvement. Society-at-large relies on computer networks everyday for tasks ranging from online banking to e-commerce, social networking, news, gambling, and just about anything else. As such, society demands that these networks remain secure. In order to maintain security the systems used to protect these networks, which are vital to the 21st century world, must be constantly updated. The task of creating a system for the 21st century fell upon several groups for the ACM 1999 KDD Cup Competition. The competition produced a winning entry, but something was lacking: The winning team's results for two of the intrusion types, User-to-Root and Remote-to-Local, were subpar at best. The winning team produced a 13.8% and 8.4% detection rate for these types respectively, compared to over 90% for each of the Denial of Service and Probing intrusion types. This research aimed to rectify this shortcoming. By implementing an unsupervised learning system, this research has produced a system that correctly detects 62.8% of User-to-Root attacks within the same dataset, with minimal false positives, while maintaining the high detection rates of Denial of Service and Probing attacks.\",\"PeriodicalId\":204568,\"journal\":{\"name\":\"2011 World Congress on Internet Security (WorldCIS-2011)\",\"volume\":\"21 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2011-04-15\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"12\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2011 World Congress on Internet Security (WorldCIS-2011)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/WORLDCIS17046.2011.5749879\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2011 World Congress on Internet Security (WorldCIS-2011)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/WORLDCIS17046.2011.5749879","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 12

摘要

网络入侵检测是一个不断变化、不断发展、不断改进的问题。整个社会每天都依赖计算机网络来完成从网上银行到电子商务、社交网络、新闻、赌博以及几乎任何其他任务。因此,社会要求这些网络保持安全。为了维护安全,用于保护这些对21世纪世界至关重要的网络的系统必须不断更新。为21世纪创建一个系统的任务落在了ACM 1999年KDD杯竞赛的几个小组身上。比赛产生了一个获奖作品,但缺少了一些东西:获胜团队在用户到root和远程到本地这两种入侵类型上的结果最多只能说是差强人意。获胜团队对这些类型的检测率分别为13.8%和8.4%,而拒绝服务和探测入侵类型的检测率均超过90%。这项研究旨在纠正这一缺点。通过实施无监督学习系统,本研究产生了一个系统,该系统可以在相同的数据集中正确检测62.8%的User-to-Root攻击,误报最少,同时保持拒绝服务和探测攻击的高检测率。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Self-organizing feature maps for User-to-Root and Remote-to-Local network intrusion detection on the KDD Cup 1999 dataset
The problem of network intrusion detection is one that is ever-changing, ever-evolving, and is always in need of improvement. Society-at-large relies on computer networks everyday for tasks ranging from online banking to e-commerce, social networking, news, gambling, and just about anything else. As such, society demands that these networks remain secure. In order to maintain security the systems used to protect these networks, which are vital to the 21st century world, must be constantly updated. The task of creating a system for the 21st century fell upon several groups for the ACM 1999 KDD Cup Competition. The competition produced a winning entry, but something was lacking: The winning team's results for two of the intrusion types, User-to-Root and Remote-to-Local, were subpar at best. The winning team produced a 13.8% and 8.4% detection rate for these types respectively, compared to over 90% for each of the Denial of Service and Probing intrusion types. This research aimed to rectify this shortcoming. By implementing an unsupervised learning system, this research has produced a system that correctly detects 62.8% of User-to-Root attacks within the same dataset, with minimal false positives, while maintaining the high detection rates of Denial of Service and Probing attacks.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信