Open Access Open Access  Restricted Access Subscription or Fee Access

Network Intrusion Detection by Finding Correlation between Multiple Features using K-means Algorithm & Multivariate Correlation Analysis

Prasad Kolhe, Siddharth Bhosale, Sagar Lathe, Shubham Mane, Rashmi Bhattad

Abstract


Network attackers are turning towards interconnected systems in networks such as web servers, database servers and cloud computing servers, thus the availability and reliability of network services are being intimidated by the growing number of Network Intrusion attacks. Effective mechanisms for Intrusion detection are needed. Different systems were proposed to safeguard these systems from intrusion attack using machine learning, statistical analysis, data mining, etc. The proposed system is an improvement over earlier systems as k- means clustering is applied to train samples so that it can categorize the samples into different clusters. After which it applies statistical methods to find the correlation between features which are clustered to gain statistical numbers in form of standard deviation, mean and covariance matrix. Applying the multivariate correlation analysis on each cluster will help us to get profile parameters according to their cluster and thus allowing us to know sharp boundary of characterizing a sample packet. This in turn will help us to reduce false positive rate.


Keywords


Network Based Attacks, Machine Learning, Statistical Analysis, Data Mining, Multivariate Correlation, K-means Clustering.

Full Text:

PDF

References


Youssef Senhaji, Hicham Medromi, “Network Security: Hybrid IDPS”,International Journal of Applied Information Systems (IJAIS) – ISSN : 2249-0868 Foundation of Computer Science FCS, New York, USA.

Shi Na, Liu Xumin, Guan yong , “Research on k-means Clustering Algorithm”, Third International Symposium on Intelligent Information Technology and Security Informatics.

Roshan Chitrakar, Huang Chuanhe, “Anomaly based Intrusion Detection using Hybrid Learning Approach of combining k-Medoids Clustering and Naïve Bayes Classification”.

Mahbod Tavallaee, Ebrahim Bagheri, Wei Lu, and Ali A. Ghorbani, “A Detailed Analysis of the KDD CUP 99 Data Set”, Proceedings of the 2009 IEEE Symposium on Computational Intelligence in Security and Defense Applications (CISDA 2009)

Zhiyuan Tan, Aruna Jamdagni, Xiangjian, Priyadarsi Nanda, Ren Ping Liu, “A System for Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis”, IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS VOL:25 NO:2 YEAR 2014.

Zhiyuan Tan, Aruna Jamdagni, Xiangjian He, Priyadarsi Nanda and Ren Ping Liu, “Triangle-Area-Based Multivariate Correlation Analysis for Effective Denial-of-Service Attack Detection” , 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications.

Alireza Osareh, Bita Shadgar, “Intrusion Detection in Computer Networks based on Machine Learning Algorithms”, IJCSNS International Journal of Computer Science and Network Security, VOL.8 No.11, November 2008

V. Paxson, “Bro: A System for Detecting Network Intruders in Realtime,”Computer Networks, vol. 31, pp. 2435-2463, 1999.

P. Garca-Teodoro, J. Daz-Verdejo, G. Maci-Fernndez, and E.Vzquez, “Anomaly-based Network Intrusion Detection: Techniques, Systems and Challenges,” Computers & Security, vol. 28,pp. 18-28, 2009.

D. E. Denning, “An Intrusion-detection Model,” IEEE Transactions on Software Engineering, pp. 222-232, 1987.

K. Lee, J. Kim, K. H. Kwon, Y. Han, and S. Kim, “DDoS attack detection method using cluster analysis,” Expert Systems with Applications, vol. 34, no. 3, pp. 1659-1665, 2008.

S. Jin, D. S. Yeung, and X. Wang, “Network Intrusion Detection in Covariance Feature Space,” Pattern Recognition, vol. 40, pp. 2185-2197, 2007.

C. F. Tsai and C. Y. Lin, “A Triangle Area Based Nearest Neighbors Approach to Intrusion Detection,” Pattern Recognition, vol. 43, pp.222-229, 2010.

Z. Tan, A. Jamdagni, X. He, P. Nanda, and R. P. Liu, “Denial of-Service Attack Detection Based on Multivariate Correlation Analysis,” Neural Information Processing, 2011, pp. 756-765.

Z. Tan, A. Jamdagni, X. He, P. Nanda, and R. P. Liu, “Triangle-Area-Based Multivariate Correlation Analysis for Effective Denial of-Service Attack Detection,” The 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications, Liverpool, United Kingdom, 2012, pp. 33-40.

M. Tavallaee, E. Bagheri, L. Wei, and A. A. Ghorbani, “A Detailed Analysis of the KDD Cup 99 Data Set,” The The Second IEEE International Conference on Computational Intelligence for Security and Defense Applications, 2009, pp. 1-6.

K. Krishna and M. Narasimha Murty, “Genetic K-means algorithm,”IEEE Trans. Syst., Man, Cybern. B, Cybern., vol. 29, no. 3, pp. 433–439, Jun. 1999.

L. Ertoz, M. Steinbach, and V. Kumar, “A new shared nearest neighbor clustering algorithm and its applications,” in Proc. Workshop Clustering High Dimensional Data Appl., 2002, pp. 105–115.

Alireza Osareh, Bita Shadgar “Intrusion Detection in Computer Networks based on Machine Learning Algorithms” Computer Science Department, Faculty of Engineering, Shahid Chamran University, Ahvaz, Iran

Yuteng Guo,Beizhan Wang, Xinxing Zhao,Xiaobiao Xie, Lida Lin, Qingda Zhou “Feature Selection Based on Rough Set and Modified Genetic Algorithm for Intrusion Detection”.

P. Garcı´a-Teodoroa, J. Dı´az-Verdejoa, G. Macia´-Ferna´ndeza, E. Va´zquez “Anomaly-based network intrusion detection:Techniques, systems and challenges”.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.