首页 | 本学科首页   官方微博 | 高级检索  
     


Improving the Detection Rate of Rarely Appearing Intrusions in Network-Based Intrusion Detection Systems
Authors:Eunmok Yang  Gyanendra Prasad Joshi  Changho Seo
Affiliation:1.Department of Financial Information Security, Kookmin University, Seoul, 02707, Korea2 Department of Computer Science and Engineering, Sejong University, Seoul, 05006, Korea3 Department of Convergence Science, Kongju National University, Gongju, 32588, Korea
Abstract:In network-based intrusion detection practices, there are more regular instances than intrusion instances. Because there is always a statistical imbalance in the instances, it is difficult to train the intrusion detection system effectively. In this work, we compare intrusion detection performance by increasing the rarely appearing instances rather than by eliminating the frequently appearing duplicate instances. Our technique mitigates the statistical imbalance in these instances. We also carried out an experiment on the training model by increasing the instances, thereby increasing the attack instances step by step up to 13 levels. The experiments included not only known attacks, but also unknown new intrusions. The results are compared with the existing studies from the literature, and show an improvement in accuracy, sensitivity, and specificity over previous studies. The detection rates for the remote-to-user (R2L) and user-to-root (U2L) categories are improved significantly by adding fewer instances. The detection of many intrusions is increased from a very low to a very high detection rate. The detection of newer attacks that had not been used in training improved from 9% to 12%. This study has practical applications in network administration to protect from known and unknown attacks. If network administrators are running out of instances for some attacks, they can increase the number of instances with rarely appearing instances, thereby improving the detection of both known and unknown new attacks.
Keywords:Intrusion detection  statistical imbalance  SMO  machine learning  network security
点击此处可从《计算机、材料和连续体(英文)》浏览原始摘要信息
点击此处可从《计算机、材料和连续体(英文)》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号