A Graphical Feature Generation Approach for Intrusion Detection

A Graphical Feature Generation Approach for Intrusion Detection

MATEC Web of Conferences 44, 002 41 (2016) DOI: 10.1051/matecconf/201644002 41 C Owned by the authors, published by EDP Sciences, 2016 A graphical feature generation approach for intrusion detection Shi Chen 1,a, Zhen Zuo 1 , Zhi Ping Huang1 and Xiao Jun Guo 1 1Department of Instrumentation Science and Technology, National University of Defense Technology, 410073 Changsha, P.R.China Abstract. In order to develop a novel effective and efficient intrusion detection system, a novel hybrid method based on a graphical features-based k-nearest neighbor approach, namely GFNN, is proposed in this paper. In GFNN, k-means clustering algorithm is used to extract cluster centre of each class in the given dataset. Then, the distance between a specific data sample and each cluster centre is calculated, and a radar chart is plotted based on the new data composed of distance based features. The sub-barycentre based features for each sample are extracted from the radar chart. As a result, our proposed approach transforms the original multi-dimensional feature space into 5-dimensional sub-barycentre feature space. The experimental results of 10-fold cross-validation based on the KDDcup99 dataset show that the GFNN not only performs better than or similar to several other approaches in terms of classification accuracy, precision, and recall. It also provides high computational efficiency for the time of classifier training and testing. Key Words: Intrusion detection; Machine learning; Graphical feature; Radar chart; k-means; k-nearest neighbors 1 Introduction techniques performs better than each technique individually [2, 6, 16, 17]. However, those hybrid With the popularity of computer network, network techniques should upgrade the computational complexity security problem becomes more and more important. and make it hard to deal with large datasets. For Although many security techniques, such as user classification problem with high dimensional data, feature authentication, data encryption, and firewalls, have been reduction techniques are always an effective method to used to improve the security of networks, there are still delete the redundancy and irrelevancy features, decrease many unsolved problems, which has made many the computation time, and finally improve the IDS researchers focus on building systems called intrusion system performance. In this line of research, some feature detection systems (IDSs) [1]. Generally, IDSs can be reduction techniques have been applied to improve the classified into two categories: misuse detection and performance of IDSs, such as GA [12], Entropy, principal anomaly detection. In misuse detection, the system component analysis (PCA) [18], etc. identifies intrusions based on known intrusion techniques In this paper, we try to develop a novel effective and and triggers alarms by detecting known exploits or efficient intrusion detection system. The main goal of this attacks based on their attack signatures. Misuse detection paper is aiming to achieve feature reduction, data can discover attacks with a low false positive rate, but it presentation, feature generation, and to enhance IDS with cannot discover novel attacks without known signatures. hybrid method combing k-means clustering algorithm, On the other hand, in anomaly detection, the system graphical features generation approach and k-NN discovers attacks by identifying deviations from normal classifier. Firstly, k-means clustering algorithm is used to network activities, it can discover novel attacks but with a extract cluster center of each pre-defined category in the high false positive rate. given dataset, which contains n categories. Secondly, the In order to enhance detection precision and detection distance between a specific data sample and each cluster stability, machine learning has been widely used to center is calculated, and then a radar chart is applied to improve IDSs, such as fuzzy theory [2, 3], k-nearest represent each new data sample composed of distance neighbor (k-NN)[4, 5], support vector machine (SVM) [6, based features. Thirdly, new graphical features (e.g., 7], artificial neural networks (ANN) [8], Naïve Bayes barycenter) for each sample are extracted from the radar networks [9], decision tree [10, 11], genetic algorithm chart. Finally, for classification, some classifiers are used (GA) [2, 12], self-organizing maps (SOM) [13], and to detect attacks based on the new dataset described by Markov chains [14, 15], etc. Based on the number of graphical features to obtain the best performance. learning techniques used, those IDSs can be categorized The rest of this paper is organized as follow. Some as two types: IDSs using single learning techniques and related work on IDSs, including the use of feature IDSs with hybrid learning techniques. Prior researches reduction and representation methods, is reviewed in have demonstrated that an ensemble of several different a Corresponding author: [email protected] This is an Open Access article distributed under the terms of the Creative Commons Attribution License 4.0, which permits distribution, and reproduction in any medium, provided the original work is properly cited. Article available at http://www.matec-conferences.org or http://dx.doi.org/10.1051/matecconf/20164402041 MATEC Web of Conferences Section 2. Section 3 presents a detailed description of the in the same cluster. As a result, a new one-dimensional proposed framework, including each step of the proposed distance based feature is used to represent each data approach. The dataset, evaluation strategies, and results sample for intrusion detection by a k-NN classifier. of a performance comparison are presented in Section 4. With the development of network and storage capacity, Finally, some conclusions are provided in Section 5. multi-dimensional data representation and analysis tasks are becoming increasingly difficult and challenging. Under such circumstance, some methods of graphical 2 Related work representation of the multi-dimensional data have been Feature reduction is an important component in machine developed in many fields. Wang and Hong [24] use a star learning, especially when dealing with high dimensional plot, which is also called radar chart, to represent a data, because the use of correct features improves multi-dimensional data for machine learning. In the star classification performance and reduces computational plot, each original feature of a data sample is represented time. In the past decades, several IDSs, which use feature by a line segment radiating from the central point of star reduction as a preprocessing phase, have been developed. plot. Then, new graphical features, such as sub-area Mukkamala and Sung [19] proposed a novel IDS features and sub-barycenter features, are extracted from based on the SVM, multivariate adaptive splines and the star plot. At last, the new dataset represented by linear genetic program. They used a new significant graphical features is utilized for training and testing of algorithm, which is independent of the modeling tools k-NN classifier. For resolving a gene classification being applied, to select features. After an input feature problem, Parkinson and Blaxter [25] developed a new being removed from the data, the remaining dataset is visualization model, which is called SimiTri. By mapping then used for training and testing the classifier. Then, the a certain gene into a triangular phase space, whose three classifier’s performance is compared to that of the vertexes represent three selected distinct gene categories, original classifier in terms of relevant performance the position of the gene within the phase space indicates criteria. Finally, the features are ranked according to a set its relationship to each of the three selected data sets and of rules based on the performance comparison. The helps determine the category of the data. This SimiTri performance of two feature reduction techniques, model can resolve 4-class classification problem. principal component analysis and linear discriminate Enlightened by TANN [21] and SimiTri [25], Luo and analysis, is compared by Datti and Lakhina [20], and the Xia [26] proposed a novel four-angle-star based back-propagation algorithm is used to test these visualized feature generation approach, FASVFG, to techniques. Eesa, Orman and Brifcani [11] proposed a evaluate the distance between samples in a five class feature selection model based on the cuttlefish classification problem for intrusion detection. In FASVFG, optimization algorithm (CFA) to produce the optimal a four angle star is constructed by a square and four subset of features. They used the decision tree as the triangles. The distance between a data sample and the classifier to improve the quality of the produced subsets vertexes of four-angle-star helps determine the class the of features. Tsai and Lin [21] proposed a hybrid approach data belonging to. combined k-means and k-NN to construct a triangle Inspired by the applications of graphical area-based nearest neighbor approach (TANN) for representation approaches above, the radar chart, intrusion detection. In TANN, 10 triangle areas formed by originally applied to analyze the financial situation of the data and five class cluster centers are generated to enterprise, is used to general new graphical features for replace the 41 original features of KDDcup99 dataset, intrusion detection in this paper. As a result, a hybrid and the approach achieved good performance. The approach is proposed to transform

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    7 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us