Clustering and classification based anomaly detection

  • Authors:
  • Hongyu Yang;Feng Xie;Yi Lu

  • Affiliations:
  • Software Research Center, Civil Aviation University of China, Tianjin, China;Software of Computing Tech., Chinese Academy of Science, Beijing, China;Security and Cryptography Laboratory, Swiss Federal Institute of Technologies (EPFL), Lausanne, Switzerland

  • Venue:
  • FSKD'06 Proceedings of the Third international conference on Fuzzy Systems and Knowledge Discovery
  • Year:
  • 2006

Quantified Score

Hi-index 0.00

Visualization

Abstract

This paper presents an anomaly detection approach based on clustering and classification for intrusion detection (ID). We use connections obtained from raw packet data of the audit trail as basic elements, then map the network connection records into 8 feature spaces typically of high dimension according to their protocols and services. The approach includes two steps, training stage and testing stage. We perform clustering to group training data points into clusters, from which we select some clusters as normal and known-attack profile according to certain criterion. For those training data excluded from the profile, we use them to build a specific classifier. During the testing stage, we utilize influence-based classification algorithm to classify network behaviors. In the algorithm, an influence function quantifies the influence of an object. The experiments on the KDD'99 Intrusion Detection Data Set demonstrate the detection performance and the effectiveness of our ID approach.