Anomaly-based intrusion detection system using Relational Detector Tree (RTD)

Publish Year: 1394
نوع سند: مقاله کنفرانسی
زبان: English
View: 920

This Paper With 8 Page And PDF Format Ready To Download

  • Certificate
  • من نویسنده این مقاله هستم

این Paper در بخشهای موضوعی زیر دسته بندی شده است:

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این Paper:

شناسه ملی سند علمی:

ICEECS02_032

تاریخ نمایه سازی: 9 مرداد 1395

Abstract:

Network security is one of the most challenging issues in network communication world. As network communications grow, vulnerabilities and penetrating attacks are predicted to be as prominent factors. So in order to thwart these attacks an intelligent and powerful intrusion detection system in required. In this paper, a multilayer intrusion detection system is proposed. In first layer, four types of detector are created using genetic algorithm which are used in the second layer to detect some anomalies or abnormal traffic data using Negative Selection Algorithm (NSA) and finally in last layer, the detected anomaly data are classified into four types of attack: DoS, Probe, R2l and U2r. The results show better performance in detecting and classifying new or unseen abnormal data. All experiments are done using KDDCUP99 dataset

Keywords:

detector , genetic algorithm , Negative Selection Algorithm (NSA) , DoS , Probe , R2l , U2r , KDDCUP99

Authors

Mohammad Dabiri

Department of Computer, Buinzahra Branch, Islamic Azad University, Buinzahra, Iran

Khashayar Khosharay

Department of Computer, Buinzahra Branch, Islamic Azad University, Buinzahra, Iran

Golnoush Abaei

Shahab Danesh Institute of Higher Education, Qom

مراجع و منابع این Paper:

لیست زیر مراجع و منابع استفاده شده در این Paper را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود Paper لینک شده اند :
  • Gordon Linoff Michal J. (1997), :Data Mining Techniques: For Marketing, ...
  • Forrest, S., Perelson, A. S., Allen, L. and Cherukuri, R. ...
  • Garcia -Teodoro, Pedro, Diaz-Verdejo, Jesus, Macia- Fernandez, Gabriel and Vazquez, ...
  • Amiri F, Rezaie Yousefi MM, Lucas , 2012. Mutual information ...
  • Sheikhan, M., & Rad, M. S. (2013). Gravitational search a ...
  • th Internationa Conference On Electrical Engineering and Computer Science (ICEECS ...
  • Aziz et al, 2012 Md et al, 2013 ...
  • Algorithm Aziz et al, 2014 ...
  • Mohammad et al, 2012 MD et al, 2012 ...
  • Khosharay et 83.46% al, 2015 RTD ...
  • th Internationa Conference On Electrical Engineering and Computer Science (ICEECS ...
  • Aziz ASA, Salama M, Hassanien A 2012. Detectors Generation using ...
  • Aziz ASA, Hanafi SE-O, Hassanien A. 2014. Multi-agent Artificial Immune ...
  • Khosharay, Kh. _ Motallebi, M. (2015), "An Intrusion Detection System ...
  • Mostaque MD, Hassan M, 2013. Network Intrusion Detection System Using ...
  • Chan, F. T., Prakash, A., Tibrewal, R K. and Tiwari, ...
  • Intelligent Computational Systems (ICICS'2013), Singapore, 1-5. ...
  • Li, D., Liu, S. and Zhang, H. (2015), _ negative ...
  • Md. Abu_Naser_ (2012), _ implementation of intrusion detection system using ...
  • Estevez-T apiador JM, Garcia-Teodoro P, Diaz-Verdejo JE..2004. Anomaly detection methods ...
  • نمایش کامل مراجع