Intrusion Detection Method Based on Fuzzy Conditional Random Fields ?

نویسندگان

  • Jun LUO
  • Yijun LI
چکیده

Intrusion detection system is the indispensable part of every computer. With the increasing attack means, all kinds of intrusion detection methods have appeared. Compared with other intrusion detection methods, the intrusion detection methods based on Conditional Random Fields (CRFs) has better detection effect, but the problems that the accuracy is low when the training data is small and the training speed is very slow simultaneously exists. To solve these problems, this paper proposes a new intrusion detection method based on Fuzzy Conditional Random Fields (FCRFs). This method aims to integrate the fuzzy logic into CRFs, establish the objective function based on FCRFs, give the corresponding algorithm of parameter estimation and inference, and then explain how it is applied into intrusion detection. The experimental results on KDD cup 1999 intrusion data set show that this method can improve the training speed and can be superior in detection Precision, Recall, F-value and generalization capability to the well-known intrusion detection method based on CRFs. The improvement in attack detection Precision and training speed are quite obvious, particularly, for the U2R attack (36.7 percent and five times improvement in Precision and training speed).

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Layered Approach for Intrusion Detection Using Fuzzy Artmap Neural Network Classifier

Intrusion Detection Systems (IDS) is a key part of system defense, where it identifies abnormal activities happening in a computer system. In general, the traditional intrusion detection relies on the extensive knowledge of security experts, in particular, on their familiarity with the computer system to be protected. To reduce this dependence, various data-mining, soft-computing and machine le...

متن کامل

Intrusion Detection Using Conditional Random Fields

Intrusion detection systems have become a key component in ensuring the safety of systems and networks. This paper introduces the probabilistic approach called Conditional Random Fields (CRF) for detecting network based intrusions. In this paper, we have shown results for the issue of accuracy using CRFs. It is demonstrated that high attack detection accuracy can be achieved by using Conditiona...

متن کامل

A Method of Data Preprocessing for Network Security Situational Awareness Based on Conditional Random Fields

Network Security Situational Awareness(NSSA) has been a hot research in the network security domain. Because of the large amount of Intrusion Detection System (IDS), We propose a new method of data preprocessing for NSSA based on conditional random fields(CRFs). It takes advantages of the CRFs models which can stitch to sequence data marking and add random attributes to deal with the amount of ...

متن کامل

A New Algorithm of Network Intrusion Detection base on the Application of Conditional Random Fields

While the network brings convenience to people, its own fragility offers intrusion opportunities for hackers and malicious attackers. Along with the diversity and complexity of intrusion attack, high performance intrusion detection techniques are required, and so the study of on-line detection, adaptive detection and multiclass detection techniques becomes current hotspot. To improve the perfor...

متن کامل

Automated Intrusion Detection for Video Surveillance Using Conditional Random Fields

In this paper, we propose a method for intrusion detection in a video surveillance scenario. For this purpose, we train a conditional random field (CRF) on features extracted from a video stream. CRFs estimate a state sequence, given a feature sequence. To detect intrusions, we analyze this state sequence. CRFs are usually trained in a supervised manner. Here, we especially propose a new traini...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013