A differentiated one-class classification method with applications to intrusion detection

被引:34
作者
Kang, Inho [3 ]
Jeong, Myong K. [1 ,2 ]
Kong, Dongjoon [4 ]
机构
[1] Rutgers State Univ, Dept Ind & Syst Engn, Piscataway, NJ 08854 USA
[2] Rutgers State Univ, RUTCOR, Piscataway, NJ 08854 USA
[3] KIDA, Seoul 130650, South Korea
[4] Univ Tennessee, Dept Ind & Informat Engn, Knoxville, TN 37996 USA
关键词
Anomaly intrusion detection; Support vector data description; One-class classification; Differentiated detection; VECTOR DATA DESCRIPTION; ANOMALY DETECTION;
D O I
10.1016/j.eswa.2011.06.033
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Intrusion detection has become an indispensable tool to keep information systems safe and reliable. Most existing anomaly intrusion detection techniques treat all types of attacks as equally important without any differentiation of the risk they pose to the information system. Although detection of all intrusions is important, certain types of attacks are more harmful than others and their detection is critical to protection of the system. This paper proposes a new one-class classification method with differentiated anomalies to enhance intrusion detection performance for harmful attacks. We also propose new extracted features for host-based intrusion detection based on three viewpoints of system activity such as dimension, structure, and contents. Experiments with simulated dataset and the DARPA 1998 BSM dataset show that our differentiated intrusion detection method performs better than existing techniques in detecting specific type of attacks. The proposed method would benefit even other applications in anomaly detection area beyond intrusion detection. (C) 2011 Elsevier Ltd. All rights reserved.
引用
收藏
页码:3899 / 3905
页数:7
相关论文
共 20 条
[1]  
[Anonymous], P 1996 IEEE S SEC PR
[2]  
[Anonymous], 2002, P 9 ACM C COMP COMM
[3]  
[Anonymous], 1998, P 7 USENIX SEC S SAN
[4]   Application of SVM and ANN for intrusion detection [J].
Chen, WH ;
Hsu, SH ;
Shen, HP .
COMPUTERS & OPERATIONS RESEARCH, 2005, 32 (10) :2617-2634
[5]   A clustering-based method for unsupervised intrusion detections [J].
Jiang, SY ;
Song, XY ;
Wang, H ;
Han, JJ ;
Li, QH .
PATTERN RECOGNITION LETTERS, 2006, 27 (07) :802-810
[6]  
LEE W, 1997, P AAAI97 WORKSH AI M
[7]   A supervised clustering and classification algorithm for mining data with mixed variables [J].
Li, XY ;
Ye, N .
IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART A-SYSTEMS AND HUMANS, 2006, 36 (02) :396-406
[8]   Grid- and dummy-cluster-based learning of normal and intrusive clusters for computer intrusion detection [J].
Li, XY ;
Ye, N .
QUALITY AND RELIABILITY ENGINEERING INTERNATIONAL, 2002, 18 (03) :231-242
[9]   A genetic clustering method for intrusion detection [J].
Liu, YG ;
Chen, KF ;
Liao, XF ;
Zhang, W .
PATTERN RECOGNITION, 2004, 37 (05) :927-942
[10]  
MIT Lincoln Labs, 1998, DARPA INTR DET EV 19