AdaBoost-based algorithm for network intrusion detection

被引:230
作者
Hu, Weiming [1 ]
Hu, Wei [1 ]
Maybank, Steve [2 ]
机构
[1] Chinese Acad Sci, Natl Lab Pattern Recognit, Inst Automat, Beijing 100080, Peoples R China
[2] Univ London Birkbeck Coll, Sch Comp Sci & Informat, London WC1E 7HX, England
来源
IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART B-CYBERNETICS | 2008年 / 38卷 / 02期
关键词
AdaBoost; computational complexity; detection rate; false-alarm rate; intrusion detection;
D O I
10.1109/TSMCB.2007.914695
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Network intrusion detection aims at distinguishing the attacks on the Internet from normal use of the Internet. It is an indispensable part of the information security system. Due to the variety of network behaviors and the rapid development of attack fashions, it is necessary to develop fast machine-learning-based intrusion detection algorithms with high detection rates and low false-alarm rates. In this correspondence, we propose an intrusion detection algorithm based on the AdaBoost algorithm. In the algorithm, decision stumps are used as weak classifiers. The decision rules are provided for both categorical and continuous features. By combining the weak classifiers for continuous features and the weak classifiers for categorical features into a strong classifier, the relations between these two different types of features are handled naturally, without any forced conversions between continuous and categorical features. Adaptable initial weights and a simple strategy for avoiding overfitting are adopted to improve the performance of the algorithm. Experimental results show that our algorithm has low computational complexity and error rates, as compared with algorithms of higher computational complexity, as tested on the benchmark sample data.
引用
收藏
页码:577 / 583
页数:7
相关论文
共 57 条
[1]   Protocol analysis in intrusion detection using decision tree [J].
Abbes, T ;
Boulloula, A ;
Rusinowitch, M .
ITCC 2004: INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: CODING AND COMPUTING, VOL 1, PROCEEDINGS, 2004, :404-408
[2]  
[Anonymous], P 9 ACM SIGKDD INT C
[3]  
[Anonymous], 2001, THESIS U CALIFORNIA
[4]   Remote attack detection method in IDA: MLSI-based intrusion detection using discriminant analysis [J].
Asaka, M ;
Onabura, T ;
Inoue, T ;
Goto, S .
2002 SYMPOSIUM ON APPLICATIONS AND THE INTERNET (SAINT 2002), PROCEEDINGS, 2002, :64-73
[5]  
Bonifacio JM, 1998, IEEE WORLD CONGRESS ON COMPUTATIONAL INTELLIGENCE, P205, DOI 10.1109/IJCNN.1998.682263
[6]  
CABARERA JBD, 2000, P MOD AN SIM COMP TE, P466
[7]   Feature deduction and ensemble design of intrusion detection systems [J].
Chebrolu, S ;
Abraham, A ;
Thomas, JP .
COMPUTERS & SECURITY, 2005, 24 (04) :295-307
[8]   AN INTRUSION-DETECTION MODEL [J].
DENNING, DE .
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 1987, 13 (02) :222-232
[9]   Network-based anomaly intrusion detection system using SOMs [J].
Depren, MÖ ;
Topallar, M ;
Anarim, E ;
Ciliz, K .
PROCEEDINGS OF THE IEEE 12TH SIGNAL PROCESSING AND COMMUNICATIONS APPLICATIONS CONFERENCE, 2004, :76-79
[10]  
Elkan Charles, 2000, ACM SIGKDD Explor. Newslett., V1, P63, DOI DOI 10.1145/846183.846199