A New Semi-unsupervised Intrusion Detection Method Based on Improved DBSCAN

نویسندگان

  • Xue-yong Li
  • Guohong Gao
  • Jia-xia Sun
چکیده

In order to improve the efficiency of the existing intrusion detection systems, this paper proposed a new semiunsupervised intrusion detection model based on improved DBSCAN algorithm, called IIDBG, and it was applied to detection engine. In IIDBG, distance calculation formula and clusters merger process were improved based on the DBSCAN and existing the improved algorithm IDBC. The experiments demonstrate that our method outperforms the existing clustering methods in terms of accuracy and detecting unknown intrusions.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Relative Network Entropy based Clustering Algorithm for Intrusion Detection

Clustering, as a kind of data mining methods, with the characteristic of no supervising, quick modeling is widely used in intrusion detection. However, most of the traditional clustering algorithms use a single data point as a calculating unit, and the drawback exists in time wasting to calculate one data point after another when clustering, meanwhile, a single local change of data will signifi...

متن کامل

Handling Intrusion Detection System using Snort Based Statistical Algorithm and Semi-supervised Approach

Intrusion detection system aims at analyzing the severity of network in terms of attack or normal one. Due to the advancement in computer field, there are numerous number of threat exploits attack over huge network. Attack rate increases gradually as detection rate increase. The main goal of using data mining within intrusion detection is to reduce the false alarm rate and to improve the detect...

متن کامل

An Improved Intrusion Detection Technique based on two Strategies Using Decision Tree and Neural Network

In this paper we enhance the notion of anomaly detection and use both neural network (NN) and decision tree (DT) for intrusion detection. While DTs are highly successful in detecting known attacks, NNs are more interesting to detect new attacks. In our method we proposed a new approach to design the system using both DT and combination of unsupervised and supervised NN for Intrusion Detection S...

متن کامل

Real-Time Traffic Classification Based on Cosine Similarity Using Sub-application Vectors

Internet traffic classification has a critical role on network monitoring, quality of service, intrusion detection, network security and trend analysis. The conventional port-based method is ineffective due to dynamic port usage and masquerading techniques. Besides, payloadbased method suffers from heavy load and encryption. Due to these facts, machine learning based statistical approaches have...

متن کامل

A New Intrusion Detection System to deal with Black Hole Attacks in Mobile Ad Hoc Networks

By extending wireless networks and because of their different nature, some attacks appear in these networks which did not exist in wired networks. Security is a serious challenge for actual implementation in wireless networks. Due to lack of the fixed infrastructure and also because of security holes in routing protocols in mobile ad hoc networks, these networks are not protected against attack...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • JNW

دوره 5  شماره 

صفحات  -

تاریخ انتشار 2010