An intelligent intrusion detection system (IDS) for anomaly and misuse detection in computer networks

被引:274
作者
Depren, O [1 ]
Topallar, M [1 ]
Anarim, E [1 ]
Ciliz, MK [1 ]
机构
[1] Bogazici Univ, Dept Elect Engn & Elect, Informat & Commun Secur Lab, Istanbul, Turkey
关键词
intrusion detection; anomaly detection; misuse detection; SOM; decision trees; J.48; KDD Cup 99; hybrid intrusion detection;
D O I
10.1016/j.eswa.2005.05.002
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In this paper, we propose a novel Intrusion Detection System (IDS) architecture utilizing both anomaly and misuse detection approaches. This hybrid Intrusion Detection System architecture consists of an anomaly detection module, a misuse detection module and a decision support system combining the results of these two detection modules. The proposed anomaly detection module uses a Self-Organizing Map (SOM) structure to model normal behavior. Deviation from the normal behavior is classified as an attack. The proposed misuse detection module uses J.48 decision tree algorithm to classify various types of attacks. The principle interest of this work is to benchmark the performance of the proposed hybrid IDS architecture by using KDD Cup 99 Data Set, the benchmark dataset used by IDS researchers. A rule-based Decision Support System (DSS) is also developed for interpreting the results of both anomaly and misuse detection modules. Simulation results of both anomaly and misuse detection modules based on the KDD 99 Data Set are given. It is observed that the proposed hybrid approach gives better performance over individual approaches. (c) 2005 Elsevier Ltd. All rights reserved.
引用
收藏
页码:713 / 722
页数:10
相关论文
共 18 条
  • [1] Anderson J., 1995, INTRO NEURAL NETWORK, DOI DOI 10.7551/MITPRESS/3905.001.0001
  • [2] [Anonymous], KDD CUP 1999 DATA SE
  • [3] Cannady J., 1998, P 1998 NAT INF SYST, P443
  • [4] Clare Amanda, 2003, Machine learning and data mining for yeast functional genomics
  • [5] Efron B., 1994, INTRO BOOTSTRAP, DOI DOI 10.1201/9780429246593
  • [6] INGHAM K, 2003, PROTECTING NETWORK S
  • [7] KAYACIK HG, 2003, THESIS MIDDLE E TU
  • [8] Kemmerer R. A., 2002, IEEE SECURITY PRIVAC
  • [9] Kohavi R., 1995, INT JOINT C ARTIFICI, DOI DOI 10.5555/1643031.1643047
  • [10] Kohonen T., 2001, SELF ORG MAP, VThird Extend