Threshold-based clustering for intrusion detection systems

Vladimir Nikulin*

*Corresponding author for this work

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    2 Citations (Scopus)

    Abstract

    Signature-based intrusion detection systems look for known, suspicious patterns in the input data, In this paper we explore compression of labeled empirical data using threshold-based clustering with regularization. The main target of clustering is to compress training dataset to the limited number of signatures, and to minimize the number of comparisons that are necessary to determine the status of the input event as a result. Essentially, the process of clustering includes merging of the clusters which are close enough. As a consequence, we will reduce original dataset to the limited number of labeled centroids. In a complex with k-nearest-neighbor (kNN) method, this set of centroids may be used as a multiclass classifier. Clearly, different attributes have different importance depending on the particular training database. This importance may be regulated in the definition of the distance using linear weight coefficients. The paper introduces special procedure to estimate above weight coefficients. The experiments on the KDD-99 intrusion detection dataset have confirmed effectiveness of the proposed methods.

    Original languageEnglish
    Title of host publicationData Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2006
    DOIs
    Publication statusPublished - 2006
    EventData Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2006 - Kissimmee, FL, United States
    Duration: 17 Apr 200618 Apr 2006

    Publication series

    NameProceedings of SPIE - The International Society for Optical Engineering
    Volume6241
    ISSN (Print)0277-786X

    Conference

    ConferenceData Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2006
    Country/TerritoryUnited States
    CityKissimmee, FL
    Period17/04/0618/04/06

    Fingerprint

    Dive into the research topics of 'Threshold-based clustering for intrusion detection systems'. Together they form a unique fingerprint.

    Cite this