基于neuro4.5算法的主动规则网络入侵检测方法

S.S. Sivatha Sindhu, S. Geetha, S. Subashini, R. Vijaya Priya, A. Kannan
{"title":"基于neuro4.5算法的主动规则网络入侵检测方法","authors":"S.S. Sivatha Sindhu, S. Geetha, S. Subashini, R. Vijaya Priya, A. Kannan","doi":"10.1109/INDCON.2006.302774","DOIUrl":null,"url":null,"abstract":"Information systems are one of the most rapidly changing and vulnerable systems, where security is a major issue. The number of security-breaking attempts originated inside the organizations is increasing steadily. Attacks made in this way, usually done by \"authorized\" users of the system cannot be immediately traced. As the idea of filtering the traffic at the entrance door, by using firewalls and the like, is not completely successful, the use of intrusion detection systems should be considered to increase the defense capacity of an information system. This paper presents a NeuroC4.5 based approach to network intrusion detection to detect anomalies in the computer networks. Decision tree is with good comprehensibility while neural network is with strong generalization ability. So, these merits are integrated into a novel decision tree algorithm NeuroC4.5. The NeuroC4.5 is employed to derive a set of classification rules from network audit data. The generated rules are then used to detect network intrusions in a real-time environment. Unlike most existing decision tree based approaches, the spawned rules are more effective because the generalization ability of NeuroC4.5 decision trees is better than that of C4.5 decision trees. A comparative evaluation of the proposed NeuroC4.5 model with the classical C4.5 algorithm, on audit data set provided by MIT Lincoln labs, has been presented; superior detection accuracy has been reported by our proposed model","PeriodicalId":122715,"journal":{"name":"2006 Annual IEEE India Conference","volume":"14 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2006-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"An Active Rule approach for Network Intrusion Detection with NeuroC4.5 Algorithm\",\"authors\":\"S.S. Sivatha Sindhu, S. Geetha, S. Subashini, R. Vijaya Priya, A. Kannan\",\"doi\":\"10.1109/INDCON.2006.302774\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Information systems are one of the most rapidly changing and vulnerable systems, where security is a major issue. The number of security-breaking attempts originated inside the organizations is increasing steadily. Attacks made in this way, usually done by \\\"authorized\\\" users of the system cannot be immediately traced. As the idea of filtering the traffic at the entrance door, by using firewalls and the like, is not completely successful, the use of intrusion detection systems should be considered to increase the defense capacity of an information system. This paper presents a NeuroC4.5 based approach to network intrusion detection to detect anomalies in the computer networks. Decision tree is with good comprehensibility while neural network is with strong generalization ability. So, these merits are integrated into a novel decision tree algorithm NeuroC4.5. The NeuroC4.5 is employed to derive a set of classification rules from network audit data. The generated rules are then used to detect network intrusions in a real-time environment. Unlike most existing decision tree based approaches, the spawned rules are more effective because the generalization ability of NeuroC4.5 decision trees is better than that of C4.5 decision trees. A comparative evaluation of the proposed NeuroC4.5 model with the classical C4.5 algorithm, on audit data set provided by MIT Lincoln labs, has been presented; superior detection accuracy has been reported by our proposed model\",\"PeriodicalId\":122715,\"journal\":{\"name\":\"2006 Annual IEEE India Conference\",\"volume\":\"14 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2006-09-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2006 Annual IEEE India Conference\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/INDCON.2006.302774\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2006 Annual IEEE India Conference","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/INDCON.2006.302774","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

摘要

信息系统是变化最迅速和最脆弱的系统之一,其中安全是一个主要问题。来自组织内部的安全破坏尝试数量正在稳步增加。以这种方式进行的攻击通常是由系统的“授权”用户进行的,无法立即追踪。由于利用防火墙等手段在入口处过滤流量的想法并不完全成功,因此应考虑使用入侵检测系统来提高信息系统的防御能力。本文提出了一种基于neuro4.5的网络入侵检测方法,用于检测计算机网络中的异常情况。决策树具有较好的可理解性,而神经网络具有较强的泛化能力。因此,将这些优点整合到一种新的决策树算法neuro4.5中。利用neuc4.5从网络审计数据中导出一组分类规则。然后使用生成的规则在实时环境中检测网络入侵。与大多数现有的基于决策树的方法不同,生成的规则更有效,因为neuro4.5决策树的泛化能力优于C4.5决策树。在麻省理工学院林肯实验室提供的审计数据集上,对所提出的NeuroC4.5模型与经典C4.5算法进行了比较评估;我们提出的模型具有较高的检测精度
本文章由计算机程序翻译,如有差异,请以英文原文为准。
An Active Rule approach for Network Intrusion Detection with NeuroC4.5 Algorithm
Information systems are one of the most rapidly changing and vulnerable systems, where security is a major issue. The number of security-breaking attempts originated inside the organizations is increasing steadily. Attacks made in this way, usually done by "authorized" users of the system cannot be immediately traced. As the idea of filtering the traffic at the entrance door, by using firewalls and the like, is not completely successful, the use of intrusion detection systems should be considered to increase the defense capacity of an information system. This paper presents a NeuroC4.5 based approach to network intrusion detection to detect anomalies in the computer networks. Decision tree is with good comprehensibility while neural network is with strong generalization ability. So, these merits are integrated into a novel decision tree algorithm NeuroC4.5. The NeuroC4.5 is employed to derive a set of classification rules from network audit data. The generated rules are then used to detect network intrusions in a real-time environment. Unlike most existing decision tree based approaches, the spawned rules are more effective because the generalization ability of NeuroC4.5 decision trees is better than that of C4.5 decision trees. A comparative evaluation of the proposed NeuroC4.5 model with the classical C4.5 algorithm, on audit data set provided by MIT Lincoln labs, has been presented; superior detection accuracy has been reported by our proposed model
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信