Skip to main content
Erschienen in: Peer-to-Peer Networking and Applications 3/2020

25.01.2020

Enhanced intrusion detection system via agent clustering and classification based on outlier detection

verfasst von: S. Sandosh, V. Govindasamy, G. Akila

Erschienen in: Peer-to-Peer Networking and Applications | Ausgabe 3/2020

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The rapid evolution of cloud computing technology has enabled seamless connection of devices on a broad spectrum. Also, it enables storage of massive quantity of data in the form of data centers. This suggests a shared pool of resources where users situated all over the world have access to the aforementioned data centers. Such a framework has cyber-security based challenges where it becomes vulnerable to external attacks. There arises a need for an Intrusion Detection System (IDS) to prevent the system from unwanted and malicious attacks. However, the existing IDS have not been able to efficiently combinehigh accuracy with low complexity and time efficiency. In order to overcome these challenges an Enhanced Intrusion Detection System via Agent Clustering and Classification based on Outlier Detection (EIDS-ACC-OD) is proposed. At first, preprocessing is performed to remove unwanted spaces using outlier detection. Then modified K-means clustering algorithm is developed for data segmentation. Further, K-Nearest Neighbor (KNN) is utilized for categorization of the attacks.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
2.
Zurück zum Zitat Javaid A et al (2016) A deep learning approach for network intrusion detection system. In: Proceedings of the 9th EAI international conference on bio-inspired information and communications technologies (formerly BIONETICS), pp. 21–26 Javaid A et al (2016) A deep learning approach for network intrusion detection system. In: Proceedings of the 9th EAI international conference on bio-inspired information and communications technologies (formerly BIONETICS), pp. 21–26
3.
Zurück zum Zitat Aljawarneh S et al (2018) Anomaly-based intrusion detection system through feature selection analysis and building hybrid efficient model. J Comput Sci 25:152–160CrossRef Aljawarneh S et al (2018) Anomaly-based intrusion detection system through feature selection analysis and building hybrid efficient model. J Comput Sci 25:152–160CrossRef
4.
Zurück zum Zitat Faisal MA et al (2015) Data-stream-based intrusion detection system for advanced metering infrastructure in smart grid: a feasibility study. IEEE Syst J 9:31–44CrossRef Faisal MA et al (2015) Data-stream-based intrusion detection system for advanced metering infrastructure in smart grid: a feasibility study. IEEE Syst J 9:31–44CrossRef
5.
Zurück zum Zitat Rajendran PK et al (2015) Hybrid intrusion detection system for private cloud: a systematic approach. Procedia Comput Sci 48:325–329CrossRef Rajendran PK et al (2015) Hybrid intrusion detection system for private cloud: a systematic approach. Procedia Comput Sci 48:325–329CrossRef
6.
Zurück zum Zitat Narudin FA et al (2016) Evaluation of machine learning classifiers for mobile malware detection. Soft Comput 20:343–357CrossRef Narudin FA et al (2016) Evaluation of machine learning classifiers for mobile malware detection. Soft Comput 20:343–357CrossRef
7.
Zurück zum Zitat Shimna KM (2015) Continuous outlier detection based on sliding window on continuous data streams. Int J Sci Res 4 Shimna KM (2015) Continuous outlier detection based on sliding window on continuous data streams. Int J Sci Res 4
8.
Zurück zum Zitat Sadiq AS et al (2018) An efficient IDS using hybrid magnetic swarm optimization in WANETs. IEEE Access 6:29041–29053CrossRef Sadiq AS et al (2018) An efficient IDS using hybrid magnetic swarm optimization in WANETs. IEEE Access 6:29041–29053CrossRef
9.
Zurück zum Zitat Pandeeswari N, Kumar G (2016) Anomaly detection system in cloud environment using fuzzy clustering based ANN. Mobile Netw Appl 21:494–505CrossRef Pandeeswari N, Kumar G (2016) Anomaly detection system in cloud environment using fuzzy clustering based ANN. Mobile Netw Appl 21:494–505CrossRef
10.
Zurück zum Zitat Rousseeuw PJ, Hubert M (2018) Anomaly detection by robust statistics. Wiley Interdiscip Rev Data Min Knowl Disc 8:e1236 Rousseeuw PJ, Hubert M (2018) Anomaly detection by robust statistics. Wiley Interdiscip Rev Data Min Knowl Disc 8:e1236
11.
Zurück zum Zitat Hu W et al (2018) Anomaly detection using local kernel density estimation and context-based regression. IEEE Trans Knowl Data Eng Hu W et al (2018) Anomaly detection using local kernel density estimation and context-based regression. IEEE Trans Knowl Data Eng
12.
Zurück zum Zitat Jabez J, Muthukumar B (2015) Intrusion detection system (IDS): anomaly detection using outlier detection approach. Procedia Comput Sci 48:338–346CrossRef Jabez J, Muthukumar B (2015) Intrusion detection system (IDS): anomaly detection using outlier detection approach. Procedia Comput Sci 48:338–346CrossRef
13.
Zurück zum Zitat Ravale U et al (2015) Feature selection based hybrid anomaly intrusion detection system using K means and RBF kernel function. Procedia Comput Sci 45:428–435CrossRef Ravale U et al (2015) Feature selection based hybrid anomaly intrusion detection system using K means and RBF kernel function. Procedia Comput Sci 45:428–435CrossRef
14.
Zurück zum Zitat Muda Z et al (2016) K-means clustering and naive bayes classification for intrusion detection. J IT Asia 4:13–25CrossRef Muda Z et al (2016) K-means clustering and naive bayes classification for intrusion detection. J IT Asia 4:13–25CrossRef
15.
Zurück zum Zitat Mohamad Tahir H et al (2015) Hybrid machine learning technique for intrusion detection system. International Conference on Computing and Informatics, 2015 Mohamad Tahir H et al (2015) Hybrid machine learning technique for intrusion detection system. International Conference on Computing and Informatics, 2015
16.
Zurück zum Zitat Puri A, Sharma N (2017) A novel technique for intrusion detection system for network security using hybrid SVM-cart. International Journal of Engineering Development and Research (IJEDR) 5:155–161 Puri A, Sharma N (2017) A novel technique for intrusion detection system for network security using hybrid SVM-cart. International Journal of Engineering Development and Research (IJEDR) 5:155–161
17.
Zurück zum Zitat Kumar A et al (2018) A novel hybrid K-means and artificial bee colony algorithm approach for data clustering. Decis Sci Lett 7:65–76CrossRef Kumar A et al (2018) A novel hybrid K-means and artificial bee colony algorithm approach for data clustering. Decis Sci Lett 7:65–76CrossRef
18.
Zurück zum Zitat Shi Y et al (2018) Malicious domain name detection based on extreme machine learning. Neural Process Lett 48:1347–1357CrossRef Shi Y et al (2018) Malicious domain name detection based on extreme machine learning. Neural Process Lett 48:1347–1357CrossRef
19.
Zurück zum Zitat Abozinadah EA et al (2015) Detection of abusive accounts with Arabic tweets. Int J Knowl Eng IACSIT 1:113–119CrossRef Abozinadah EA et al (2015) Detection of abusive accounts with Arabic tweets. Int J Knowl Eng IACSIT 1:113–119CrossRef
20.
Zurück zum Zitat Veni RH et al (2018) Identifying malicious web links and their attack types in social networks, ed: IJSRCSEIT Veni RH et al (2018) Identifying malicious web links and their attack types in social networks, ed: IJSRCSEIT
21.
Zurück zum Zitat Anfilofiev A et al (2014) Algorithm for tuning fuzzy network attack classifiers based on invasive weed optimization. In: 2014 dynamics of systems, mechanisms and machines (dynamics), pp. 1–4 Anfilofiev A et al (2014) Algorithm for tuning fuzzy network attack classifiers based on invasive weed optimization. In: 2014 dynamics of systems, mechanisms and machines (dynamics), pp. 1–4
22.
Zurück zum Zitat Meti N et al (2017) Detection of distributed denial of service attacks using machine learning algorithms in software defined networks. In: 2017 international conference on advances in computing, communications and informatics (ICACCI), pp. 1366–1371 Meti N et al (2017) Detection of distributed denial of service attacks using machine learning algorithms in software defined networks. In: 2017 international conference on advances in computing, communications and informatics (ICACCI), pp. 1366–1371
Metadaten
Titel
Enhanced intrusion detection system via agent clustering and classification based on outlier detection
verfasst von
S. Sandosh
V. Govindasamy
G. Akila
Publikationsdatum
25.01.2020
Verlag
Springer US
Erschienen in
Peer-to-Peer Networking and Applications / Ausgabe 3/2020
Print ISSN: 1936-6442
Elektronische ISSN: 1936-6450
DOI
https://doi.org/10.1007/s12083-019-00822-3

Weitere Artikel der Ausgabe 3/2020

Peer-to-Peer Networking and Applications 3/2020 Zur Ausgabe

Premium Partner