Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/1456223.1456238acmotherconferencesArticle/Chapter ViewAbstractPublication PagescststConference Proceedingsconference-collections
research-article

Improving performance of intrusion detection system by applying a new machine learning strategy

Published: 28 October 2008 Publication History

Abstract

The most acute problem for misuse detection method is its inability to detect new kinds of attacks. A better detection method, which uses a new learning strategy, is proposed to solve this problem. A Concept Hierarchy Generation for attack Labels (CHGL) applying relevant feature subset codes clustering, makes common machine learning algorithms learn attack profiles on high concept levels. And that will enable the system detect more attack instances. Experimental results show the advantage of this new method.

References

[1]
A. Ghosh, J. Wanken, and F, Charron. Detecting Anomalous and Unknown Intrusions Against Programs. In Proceedings of the 14th Annual Computer Security Applications Conference December 7--11, 1998 Phoenix, Arizona.
[2]
J. Ryan, M. Lin, and R. Miikkulainen, Intrusion Detection with Neural Networks, in the AAAI Workshop, 1997, pp. 72--79.
[3]
W. Lee, S. J. Stolfo, and K. W. Mok, A Data Mining Framework for Building Intrusion Detection Models, in Proceedings of the 1999 IEEE Symposium on Security and Privacy, 1999, pp. 120--132.
[4]
Guy Helmer, Automated Discovery of Concise Predictive Rules for Intrusion Detection. Journal of Systems and Software, Vol. 60, February 2002.
[5]
J. Han and M. Kamber, Data Mining: Concepts and Techniques, Morgan Kaufmann, New York, 2000.
[6]
Donald L. Blanchard, The ABC's of Animal Taxonomy. The Cold Blooded News, Vol. 26, No. 1, January 1999.
[7]
Vapnik V., The Nature of Statistical Learning Theory (the second edition). New York: Springer-Verlag 1998.
[8]
R. D. Lackey, Penetration of Computer Systems, an Overview. Honeywell Computer Journal, 8(2): 81--85, 1974.
[9]
P. G. Neumann and D. B. Parker, A Summary of Computer Misuse Techniques. In Proceedings of the 12th National Computer Security Conference, pages 396--407, Baltimore, Maryland, USA, Oct. 10--13, 1989.
[10]
D. L. Brinkley and R. R. Schell, What Is There to Worry About? An Introduction to The Computer Security Problem. In M. D. Abrams, S. Jajodia, and H. J. Podell, editors, Information Security: An Integrated Collection of Essays, pages11--39. IEEE Computer Society Press, 1995.
[11]
S. Kumar, Classification and Detection of Computer Intrusions. PhD thesis, Purdue University, West Lafayette, Indiana, USA, Aug. 1995.
[12]
Tao Zou, and Hongwei Sun, Data Reduction in Network Based Intrusion Detection System, Journal of National University of Defense Technology, 2003.
[13]
Liang Tie-zhu, Li Jian-Cheng, Wang Ye, A Novel Clustering-Based Method to Network Intrusion Detection. Journal of National University of Defense Technology, Vol. 24, No. 2 2002.
[14]
DARPA 1998 Intrusion Detection Evaluation, in http://www.ll.mit.edu/IST/ideval/index.html.
[15]
Cohen, W. W., Fast Effective Rule Induction. In Proceedings of the 12th International Conference on Machine Learning, Lake Tahoe, CA. Morgan Kaufmann, Los Altos, 1995.

Index Terms

  1. Improving performance of intrusion detection system by applying a new machine learning strategy

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Other conferences
      CSTST '08: Proceedings of the 5th international conference on Soft computing as transdisciplinary science and technology
      October 2008
      733 pages
      ISBN:9781605580463
      DOI:10.1145/1456223
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Sponsors

      • The French Chapter of ACM Special Interest Group on Applied Computing
      • Ministère des Affaires Etrangères et Européennes
      • Région Ile de France
      • Communauté d'Agglomération de Cergy-Pontoise
      • Institute of Electrical and Electronics Engineers Systems, Man and Cybernetics Society
      • The European Society For Fuzzy And technology
      • Institute of Electrical and Electronics Engineers France Section
      • Laboratoire des Equipes Traitement des Images et du Signal
      • AFIHM: Ass. Francophone d'Interaction Homme-Machine
      • The International Fuzzy System Association
      • Laboratoire Innovation Développement
      • University of Cergy-Pontoise
      • The World Federation of Soft Computing
      • Agence de Développement Economique de Cergy-Pontoise
      • The European Neural Network Society
      • Comité d'Expansion Economique du Val d'Oise

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 28 October 2008

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. classification
      2. clustering
      3. intrusion detection systems
      4. misuse detection

      Qualifiers

      • Research-article

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • 0
        Total Citations
      • 222
        Total Downloads
      • Downloads (Last 12 months)5
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 04 Oct 2024

      Other Metrics

      Citations

      View Options

      Get Access

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media