Title :
Towards Fast Detecting Intrusions: Using Key Attributes of Network Traffic
Author :
Wang, Wei ; Gombault, Sylvain ; Guyet, Thomas
fDate :
June 29 2008-July 5 2008
Abstract :
Extracting attributes from network traffic is the first step of network intrusion detection. However, the question of what attributes are most effective for the detection still remains. In this paper, we employed information gain, wrapper with Bayesian networks (BN) and decision trees (C4.5) respectively to select key subsets of attributes for network intrusion detection based on KDD Cup 1999 data. We then used the selected 10 attributes to detect DDoS attacks in the real environments. The empirical results based on KDD Cup 1999 data as well as DDoS attack data show that only using the 10 attributes, the detection accuracy almost remains the same or even becomes better compared with that of using all the 41 attributes with both BN and C4.5 classifiers. Using a small subset of attributes also improves the efficiency of intrusion detection.
Keywords :
belief networks; computer networks; decision trees; security of data; Bayesian networks; DDoS attacks; decision trees; information gain; network intrusion detection; network traffic; Bayesian methods; Computer crime; Data mining; Decision trees; Information security; Intrusion detection; Monitoring; Support vector machines; Telecommunication traffic; Traffic control;
Conference_Titel :
Internet Monitoring and Protection, 2008. ICIMP '08. The Third International Conference on
Conference_Location :
Bucharest
Print_ISBN :
978-0-7695-3189-2
Electronic_ISBN :
978-0-7695-3189-2
DOI :
10.1109/ICIMP.2008.13