Intrusion detection method based on nonlinear correlation measure

被引:12
作者
Ambusaidi, Mohammed A. [1 ]
Tan, Zhiyuan [1 ]
He, Xiangjian [1 ]
Nanda, Priyadarsi [1 ]
Lu, Liang Fu [1 ]
Jamdagni, Aruna [1 ]
机构
[1] Univ Technol, Fac Engn & Informat Technol, Ctr Innovat IT Serv & Applicat iNEXT, Sch Comp & Commun, Sydney, NSW, Australia
关键词
intrusion detection; nonlinear correlation coefficient; NCC; mutual information; MI; DoS attacks;
D O I
10.1504/IJIPT.2014.066377
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cyber crimes and malicious network activities have posed serious threats to the entire internet and its users. This issue is becoming more critical, as network-based services, are more widespread and closely related to our daily life. Thus, it has raised a serious concern in individual internet users, industry and research community. A significant amount of work has been conducted to develop intelligent anomaly-based intrusion detection systems (IDSs) to address this issue. However, one technical challenge, namely reducing false alarm, has been along with the development of anomaly-based IDSs since 1990s. In this paper, we provide a solution to this challenge. A nonlinear correlation coefficient-based (NCC) similarity measure is proposed to help extract both linear and nonlinear correlations between network traffic records. This extracted correlative information is used in our proposed IDS to detect malicious network behaviours. The effectiveness of the proposed NCC-based measure and the proposed IDS are evaluated using NSL-KDD dataset. The evaluation results demonstrate that the proposed NCC-based measure not only helps reduce false alarm rate, but also helps discriminate normal and abnormal behaviours efficiently.
引用
收藏
页码:77 / 86
页数:10
相关论文
共 30 条
[1]   Mutual information-based feature selection for intrusion detection systems [J].
Amiri, Fatemeh ;
Yousefi, MohammadMahdi Rezaei ;
Lucas, Caro ;
Shakery, Azadeh ;
Yazdani, Nasser .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2011, 34 (04) :1184-1199
[2]  
[Anonymous], 1995, SRICSL9507
[3]  
Anuar NB, 2008, MALAYS J COMPUT SCI, V21, P101
[4]  
Barford P, 2002, IMW 2002: PROCEEDINGS OF THE SECOND INTERNET MEASUREMENT WORKSHOP, P71, DOI 10.1145/637201.637210
[5]  
Beauquier J., 2007, CESSE07
[6]  
Bhat A. H., 2013, INT J APPL INNOV ENG, V2, P56
[7]  
de la Hoz E, 2013, LECT NOTES COMPUT SC, V8073, P103, DOI 10.1007/978-3-642-40846-5_11
[8]   Intrusion detection with data correlation relation graph [J].
Hassanzadeh, Amin ;
Sadeghian, Babak .
ARES 2008: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON AVAILABILITY, SECURITY AND RELIABILITY, 2008, :982-989
[9]   AdaBoost-based algorithm for network intrusion detection [J].
Hu, Weiming ;
Hu, Wei ;
Maybank, Steve .
IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART B-CYBERNETICS, 2008, 38 (02) :577-583
[10]  
Jamdagni A., 2010, P 6 INT WIR COMM MOB, P1193, DOI DOI 10.1145/1815396.1815669