DocumentCode :
1753904
Title :
Self-organizing feature maps for User-to-Root and Remote-to-Local network intrusion detection on the KDD Cup 1999 dataset
Author :
Wilson, Ryan ; Obimbo, Charlie
Author_Institution :
Sch. of Comput. Sci., Univ. of Guelph, Guelph, ON, Canada
fYear :
2011
fDate :
21-23 Feb. 2011
Firstpage :
42
Lastpage :
47
Abstract :
The problem of network intrusion detection is one that is ever-changing, ever-evolving, and is always in need of improvement. Society-at-large relies on computer networks everyday for tasks ranging from online banking to e-commerce, social networking, news, gambling, and just about anything else. As such, society demands that these networks remain secure. In order to maintain security the systems used to protect these networks, which are vital to the 21st century world, must be constantly updated. The task of creating a system for the 21st century fell upon several groups for the ACM 1999 KDD Cup Competition. The competition produced a winning entry, but something was lacking: The winning team´s results for two of the intrusion types, User-to-Root and Remote-to-Local, were subpar at best. The winning team produced a 13.8% and 8.4% detection rate for these types respectively, compared to over 90% for each of the Denial of Service and Probing intrusion types. This research aimed to rectify this shortcoming. By implementing an unsupervised learning system, this research has produced a system that correctly detects 62.8% of User-to-Root attacks within the same dataset, with minimal false positives, while maintaining the high detection rates of Denial of Service and Probing attacks.
Keywords :
computer network security; self-organising feature maps; unsupervised learning; KDD Cup 1999 Dataset; computer networks; denial of service attacks; e-commerce; online banking; probing attacks; remote-to-local network intrusion detection; self-organizing feature maps; social networking; unsupervised learning system; user-to-root network intrusion detection; Computer crime; Intrusion detection; Machine learning algorithms; Probes; Testing; Training; Training data;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Internet Security (WorldCIS), 2011 World Congress on
Conference_Location :
London
Print_ISBN :
978-1-4244-8879-7
Electronic_ISBN :
978-0-9564263-7-6
Type :
conf
Filename :
5749879
Link To Document :
بازگشت