Title :
Hierarchical Kohonenen net for anomaly detection in network security
Author :
Sarasamma, Suseela T. ; Zhu, Qiuming A. ; Huff, Julie
Author_Institution :
Northrop Grumman Mission Syst., Bellevue, NE, USA
fDate :
4/1/2005 12:00:00 AM
Abstract :
A novel multilevel hierarchical Kohonen Net (K-Map) for an intrusion detection system is presented. Each level of the hierarchical map is modeled as a simple winner-take-all K-Map. One significant advantage of this multilevel hierarchical K-Map is its computational efficiency. Unlike other statistical anomaly detection methods such as nearest neighbor approach, K-means clustering or probabilistic analysis that employ distance computation in the feature space to identify the outliers, our approach does not involve costly point-to-point computation in organizing the data into clusters. Another advantage is the reduced network size. We use the classification capability of the K-Map on selected dimensions of data set in detecting anomalies. Randomly selected subsets that contain both attacks and normal records from the KDD Cup 1999 benchmark data are used to train the hierarchical net. We use a confidence measure to label the clusters. Then we use the test set from the same KDD Cup 1999 benchmark to test the hierarchical net. We show that a hierarchical K-Map in which each layer operates on a small subset of the feature space is superior to a single-layer K-Map operating on the whole feature space in detecting a variety of attacks in terms of detection rate as well as false positive rate.
Keywords :
probability; security of data; self-organising feature maps; computer network security; hierarchical Kohonenen Net; intrusion detection system; multilevel hierarchical K-Map; neural network application; probabilistic analysis; self-organizing feature maps; Benchmark testing; Computational efficiency; Computer hacking; Computer networks; Computer vision; Information security; Intelligent networks; Intrusion detection; Nearest neighbor searches; Organizing; Computer network security; neural network applications; self-organizing feature maps; Algorithms; Artificial Intelligence; Computer Communication Networks; Computer Security; Computer Simulation; Models, Statistical; Neural Networks (Computer); Pattern Recognition, Automated;
Journal_Title :
Systems, Man, and Cybernetics, Part B: Cybernetics, IEEE Transactions on
DOI :
10.1109/TSMCB.2005.843274