Title :
An iterative ellipsoid-based anomaly detection technique for intrusion detection systems
Author :
Suthaharan, Shan
Author_Institution :
Dept. of Comput. Sci., Univ. of North Carolina at Greensboro, Greensboro, NC, USA
Abstract :
Intrusion detection datasets play a major role in evaluating machine learning techniques for Intrusion Detection Systems. The Intrusion detection datasets are generally very large and contain many noncontributing features and redundant data. These drawbacks lead to inaccurate intrusion detection and increased computational cost when machine learning techniques are evaluated. Several data cleaning techniques have been proposed to eliminate redundant records and noncontributing features. These techniques reduce the size of the datasets significantly and make the characteristics of the data closer to the characteristics of intrusions in a real network. This paper identifies anomaly problems in normal and intrusion attacks data, and proposes an ellipsoid-based technique to detect anomalies and clean the intrusion detection datasets further. Publically available KDD´99 and NSL-KDD datasets are used to demonstrate its performance. It reveals an interesting property, i.e. monotonically decreasing behavior, of the NSL-KDD dataset.
Keywords :
learning (artificial intelligence); redundancy; security of data; KDD´99 datasets; NSL-KDD datasets; anomaly problems; data cleaning techniques; ellipsoid-based technique; intrusion attacks data; intrusion detection datasets; intrusion detection systems; iterative ellipsoid-based anomaly detection technique; machine learning techniques; redundant data; redundant record elimination; Accuracy; Approximation methods; Ellipsoids; Feature extraction; Intrusion detection; Kernel; Machine learning; KDD´99 dataset; NSL-KDD dataset; anomaly detection; intrusion detection;
Conference_Titel :
Southeastcon, 2012 Proceedings of IEEE
Conference_Location :
Orlando, FL
Print_ISBN :
978-1-4673-1374-2
DOI :
10.1109/SECon.2012.6196956