Towards practical anomaly-based intrusion detection by outlier mining on TCP packets

5Citations
Citations of this article
10Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Intrusion detection System (IDS) is an important part of the security of large networks like the Internet. With increasing number of data being transmitted day by day from one subnetwork to another, the system needs to identify intrusion in such large datasets in an effectively and timely manner. So the application of knowledge discovery comes handy to identify unusual accesses or attacks. Improving an IDS's performance and accuracy is one of the major challenges network security research today. In this paper, we propose a practical anomaly-based IDS using outlier mining of the readily available basic Transmission Control Protocol (TCP) header information as well as other easily derivable attributes. We use a two-step approach of k-means clustering and one-class support vector machine (SVM) to model the normal sessions presented in MIT DARPA '99 dataset. We then feed the testing set to the resultant model to predict the attacks sessions. © 2014 Springer International Publishing Switzerland.

Cite

CITATION STYLE

APA

Manandhar, P., & Aung, Z. (2014). Towards practical anomaly-based intrusion detection by outlier mining on TCP packets. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 8645 LNCS, pp. 164–173). Springer Verlag. https://doi.org/10.1007/978-3-319-10085-2_14

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free