An active learning based TCM-KNN algorithm for supervised network intrusion detection

被引:88
作者
Li, Yang [1 ]
Guo, Li [1 ]
机构
[1] Chinese Acad Sci, Inst Comp Technol, Beijing 100080, Peoples R China
关键词
network security; intrusion detection; TCM-KNN (Transductive Confidence Machines for K-Nearest Neighbors); algorithm; machine learning; active learning;
D O I
10.1016/j.cose.2007.10.002
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As network attacks have increased in number and severity over the past few years, intrusion detection is increasingly becoming a critical component of secure information systems and supervised network intrusion detection has been an active and difficult research topic in the field of intrusion detection for many years. However, it hasn't been widely applied in practice due to some inherent issues. The most important reason is the difficulties in obtaining adequate attack data for the supervised classifiers to model the attack patterns, and the data acquisition task is always time-consuming and greatly relies on the domain experts. In this paper, we propose a novel supervised network intrusion detection method based on TCM-KNN (Transductive Confidence Machines for K-Nearest Neighbors) machine learning algorithm and active learning based training data selection method. It can effectively detect anomalies with high detection rate, low false positives under the circumstance of using much fewer selected data as well as selected features for training in comparison with the traditional supervised intrusion detection methods. A series of experimental results on the well-known KDD Cup 1999 data set demonstrate that the proposed method is more robust and effective than the state-of-the-art intrusion detection methods, as well as can be further optimized as discussed in this paper for real applications. (c) 2007 Elsevier Ltd. All rights reserved.
引用
收藏
页码:459 / 467
页数:9
相关论文
共 29 条
[1]  
Abraham Tamas, 2001, IDDM INTRUSION DETEC
[2]  
BALDRIDGE J, 2003, P 7 C NAT LANG LEARN, P23
[3]  
Barbara D., 2001, P 2001 IEEE WORKSH I, P310
[4]  
Barbara D, 2006, P 12 ACM SIGKDD INT, P55, DOI 10.1145/1150402.1150413
[5]  
BARBARA D, 2001, P 1 SIAM C DAT MIN C, P1
[6]   Detecting network intrusions via a statistical analysis of network packet characteristics [J].
Bykova, M ;
Ostermann, S ;
Tjaden, B .
PROCEEDINGS OF THE 33RD SOUTHEASTERN SYMPOSIUM ON SYSTEM THEORY, 2001, :309-314
[7]   AN INTRUSION-DETECTION MODEL [J].
DENNING, DE .
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 1987, 13 (02) :222-232
[8]  
Eskin E., 2002, Applications of Data Mining in Computer Security, P77, DOI [10.1007/978-1-4615-0953-04, DOI 10.1007/978-1-4615-0953-04]
[9]   Prediction algorithms and confidence measures based on algorithmic randomness theory [J].
Gammerman, A ;
Vovk, V .
THEORETICAL COMPUTER SCIENCE, 2002, 287 (01) :209-217
[10]  
Ghosh AK, 1999, USENIX ASSOCIATION PROCEEDINGS OF THE EIGHTH USENIX SECURITY SYMPOSIUM (SECURITY '99), P141