scispace - formally typeset
Open AccessJournal ArticleDOI

Intrusion Detection using a Novel Hybrid Method Incorporating an Improved KNN

Hossein Shapoorifard, +1 more
- 15 Sep 2017 - 
- Vol. 173, Iss: 1, pp 5-9
Reads0
Chats0
TLDR
This paper focuses on improving KNN classifier in existing intrusion detection task which combines K-MEANS clustering and KNN classification, to improve IDS performance.
Abstract
These days, with the tremendous growth of network-based service and shared information on networks, the risk of network attacks and intrusions increases too, therefore network security and protecting the network is getting more significance than before. Intrusion Detection System (IDS) is one of the solutions to detect attacks and anomalies in the network. The ever rising new intrusion or attack types causes difficulties for their detection, therefore Data mining techniques has been widely applied in network intrusion detection systems for extracting useful knowledge from large number of network data to detect intrusions. Many clustering and classification algorithms are used in IDS, therefore improving the functionality of these algorithms will improve IDS performance. This paper focuses on improving KNN classifier in existing intrusion detection task which combines K-MEANS clustering and KNN classification.

read more

Content maybe subject to copyright    Report

Citations
More filters
Journal ArticleDOI

Machine Learning and Deep Learning Methods for Cybersecurity

TL;DR: This survey report describes key literature surveys on machine learning (ML) and deep learning (DL) methods for network analysis of intrusion detection and provides a brief tutorial description of each ML/DL method.
Journal ArticleDOI

Cybersecurity data science: an overview from machine learning perspective

TL;DR: This paper focuses and briefly discusses on cybersecurity data science, where the data is being gathered from relevant cybersecurity sources, and the analytics complement the latest data-driven patterns for providing more effective security solutions.
Journal ArticleDOI

BAT: Deep Learning Methods on Network Intrusion Detection Using NSL-KDD Dataset

TL;DR: The proposed end-to-end model does not use any feature engineering skills and can automatically learn the key features of the hierarchy and can well describe the network traffic behavior and improve the ability of anomaly detection effectively.
Journal ArticleDOI

IntruDTree: A Machine Learning Based Cyber Security Intrusion Detection Model

TL;DR: This paper presents an Intrusion Detection Tree (“IntruDTree”) machine-learning-based security model that first takes into account the ranking of security features according to their importance and then builds a tree-based generalized intrusion detection model based on the selected important features.
Journal ArticleDOI

Intrusion Detection of Imbalanced Network Traffic Based on Machine Learning and Deep Learning

TL;DR: Wang et al. as discussed by the authors proposed a novel Difficult Set Sampling Technique (DSSTE) algorithm to tackle the class imbalance problem, which divides the imbalanced training set into the difficult set and the easy set.
References
More filters
Journal ArticleDOI

Review: Intrusion detection system: A comprehensive review

TL;DR: Through the extensive survey and sophisticated organization, this work proposes the taxonomy to outline modern IDSs and tries to give a more elaborate image for a comprehensive review.
Journal ArticleDOI

CANN: An intrusion detection system based on combining cluster centers and nearest neighbors

TL;DR: A novel feature representation approach, namely the cluster center and nearest neighbor (CANN) approach, which shows that the CANN classifier not only performs better than or similar to k-NN and support vector machines trained and tested by the original feature representation in terms of classification accuracy, detection rates, and false alarms.
Journal ArticleDOI

A novel hybrid intrusion detection method integrating anomaly detection with misuse detection

TL;DR: The experimental results demonstrate that the proposed hybrid intrusion detection method is better than the conventional methods in terms of the detection rate for both unknown and known attacks while it maintains a low false positive rate.
Journal ArticleDOI

Immune system approaches to intrusion detection --- a review

TL;DR: This work provides an introduction and analysis of the key developments within the use of artificial immune systems in intrusion detection, in addition to making suggestions for future research.
Journal ArticleDOI

Network Anomaly Detection by Cascading K-Means Clustering and C4.5 Decision Tree algorithm

TL;DR: This paper proposes a method to cascade k-Means clustering and the C4.5 decision tree methods for classifying anomalous and normal activities in a computer network, and exploits the results derived from the decision tree on each cluster.
Related Papers (5)