An automatically tuning intrusion detection system

被引:45
作者
Yu, Zhenwei [1 ]
Tsai, Jeffrey J. P.
Weigert, Thomas
机构
[1] Univ Illinois, Dept Comp Sci, Chicago, IL 60607 USA
[2] Motorola Inc, Schaumburg, IL 60196 USA
来源
IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART B-CYBERNETICS | 2007年 / 37卷 / 02期
关键词
attack detection model; classification; data mining; intrusion detection; learning algorithm; model-tuning algorithm; self-organizing map (SOM);
D O I
10.1109/TSMCB.2006.885306
中图分类号
TP [自动化技术、计算机技术];
学科分类号
080201 [机械制造及其自动化];
摘要
An intrusion detection system (IDS) is a security layer used to detect ongoing intrusive activities in information systems. Traditionally, intrusion detection relies on extensive knowledge of security experts, in particular, on their familiarity with the computer system to be protected. To reduce this dependence, various data-mining and machine learning techniques have been deployed for intrusion detection. An IDS is usually working in a dynamically changing environment, which forces continuous tuning of the intrusion detection model, in order to maintain sufficient performance. The manual tuning process required by current systems depends on the system operators in working out the tuning solution and in integrating it into the detection model. In this paper, an automatically tuning IDS (ATIDS) is presented. The proposed system will automatically tune the detection model on-the-fly according to the feedback provided by the system operator when false predictions are encountered. The system is evaluated using the KDDCup'99 intrusion detection dataset. Experimental results show that the system achieves up to 35% improvement in terms of misclassification cost when compared with a system lacking the tuning feature. If only 10% false predictions are used to tune the model, the system still achieves about 30% improvement. Moreover, when tuning is not delayed too long, the system can achieve about 20% improvement, with only 1.3% of the false predictions used to tune the model. The results of the experiments show that a practical system can be built based on ATIDS: system operators can focus on verification of predictions with low confidence, as only those predictions determined to be false will be used to tune the detection model.
引用
收藏
页码:373 / 384
页数:12
相关论文
共 29 条
[1]
Agarwal R., 2001, P 1 SIAM C DAT MIN A
[2]
[Anonymous], 2000, ACM SIGKDD EXPLORATI, DOI DOI 10.1145/846183.846201
[3]
Barbara Daniel., 2001, P IEEE WORKSHOP INFO, P11
[4]
Cohen WW, 1999, SIXTEENTH NATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE (AAAI-99)/ELEVENTH INNOVATIVE APPLICATIONS OF ARTIFICIAL INTELLIGENCE (IAAI-99), P335
[5]
DUBRAWSKY I, SAFE IDS DEPLOYMENT
[6]
Elkan C., 2000, Acm Sigkdd Explorations Newsletter, V1, P63
[7]
Ertoz L., 2004, The MINDS-Minnesota Intrusion Detection System
[8]
ESKIN E, 2000, P 7 ACM C COMP SEC W
[9]
Faussett L.V., 1994, Fundamentals of Neural Networks: architectures, algorithms and applications
[10]
Giacinto G, 2003, LECT NOTES COMPUT SC, V2709, P346