An active learning based TCM-KNN algorithm for supervised network intrusion detection

被引:88
作者
Li, Yang [1 ]
Guo, Li [1 ]
机构
[1] Chinese Acad Sci, Inst Comp Technol, Beijing 100080, Peoples R China
关键词
network security; intrusion detection; TCM-KNN (Transductive Confidence Machines for K-Nearest Neighbors); algorithm; machine learning; active learning;
D O I
10.1016/j.cose.2007.10.002
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As network attacks have increased in number and severity over the past few years, intrusion detection is increasingly becoming a critical component of secure information systems and supervised network intrusion detection has been an active and difficult research topic in the field of intrusion detection for many years. However, it hasn't been widely applied in practice due to some inherent issues. The most important reason is the difficulties in obtaining adequate attack data for the supervised classifiers to model the attack patterns, and the data acquisition task is always time-consuming and greatly relies on the domain experts. In this paper, we propose a novel supervised network intrusion detection method based on TCM-KNN (Transductive Confidence Machines for K-Nearest Neighbors) machine learning algorithm and active learning based training data selection method. It can effectively detect anomalies with high detection rate, low false positives under the circumstance of using much fewer selected data as well as selected features for training in comparison with the traditional supervised intrusion detection methods. A series of experimental results on the well-known KDD Cup 1999 data set demonstrate that the proposed method is more robust and effective than the state-of-the-art intrusion detection methods, as well as can be further optimized as discussed in this paper for real applications. (c) 2007 Elsevier Ltd. All rights reserved.
引用
收藏
页码:459 / 467
页数:9
相关论文
共 29 条
[11]  
HO SS, 2003, P IEEE JOINT C NEUR, P20
[12]  
Lee W., 2000, ACM Transactions on Information and Systems Security, V3, P227, DOI 10.1145/382912.382914
[13]  
Lee W, 1998, PROCEEDINGS OF THE SEVENTH USENIX SECURITY SYMPOSIUM, P79
[14]  
LI M, 1998, INTRO KOLMOGOROV COM
[15]  
Li Y, 2007, 2007 International Symposium on Computer Science & Technology, Proceedings, P133
[16]   An efficient network anomaly detection scheme based on TCM-KNN algorithm and data reduction mechanism [J].
Li, Yang ;
Guo, Li .
2007 IEEE INFORMATION ASSURANCE WORKSHOP, 2007, :221-+
[17]  
Lippmann R, 2000, P DARPA INF SURV C E, V2, P12, DOI DOI 10.1109/DISCEX.2000.821506
[18]   Improving intrusion detection performance using keyword selection and neural networks [J].
Lippmann, RP ;
Cunningham, RK .
COMPUTER NETWORKS-THE INTERNATIONAL JOURNAL OF COMPUTER AND TELECOMMUNICATIONS NETWORKING, 2000, 34 (04) :597-603
[19]  
Luo JX, 2000, INT J INTELL SYST, V15, P687, DOI 10.1002/1098-111X(200008)15:8<687::AID-INT1>3.0.CO
[20]  
2-X