We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

Article:A Secure Network Detection System against Noisy Unlabeled Data

by Shailesh Kumar Gaikwad, Prof. Vijay Shah, Yogendra Kumar Jain
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 9 - Number 9
Year of Publication: 2010
Authors: Shailesh Kumar Gaikwad, Prof. Vijay Shah, Yogendra Kumar Jain
10.5120/1416-1912

Shailesh Kumar Gaikwad, Prof. Vijay Shah, Yogendra Kumar Jain . Article:A Secure Network Detection System against Noisy Unlabeled Data. International Journal of Computer Applications. 9, 9 ( November 2010), 7-11. DOI=10.5120/1416-1912

@article{ 10.5120/1416-1912,
author = { Shailesh Kumar Gaikwad, Prof. Vijay Shah, Yogendra Kumar Jain },
title = { Article:A Secure Network Detection System against Noisy Unlabeled Data },
journal = { International Journal of Computer Applications },
issue_date = { November 2010 },
volume = { 9 },
number = { 9 },
month = { November },
year = { 2010 },
issn = { 0975-8887 },
pages = { 7-11 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume9/number9/1416-1912/ },
doi = { 10.5120/1416-1912 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T19:58:28.721607+05:30
%A Shailesh Kumar Gaikwad
%A Prof. Vijay Shah
%A Yogendra Kumar Jain
%T Article:A Secure Network Detection System against Noisy Unlabeled Data
%J International Journal of Computer Applications
%@ 0975-8887
%V 9
%N 9
%P 7-11
%D 2010
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Today, the Internet along with the corporate network plays a major role in creating and advancing new business avenues. With the ever increasing deployment and usage of gigabit networks, traditional network anomaly detection based intrusion detection systems have not scaled accordingly. Most, if not all, systems deployed assume the availability of complete and clean data for the purpose of intrusion detection. We contend that this assumption is not valid. Factors like noise in the audit data, mobility of the nodes, and the large amount of data generated by the network make it difficult to build a normal traffic profile of the network for the purpose of anomaly detection. From this perspective, the leitmotif of the research effort described in this dissertation is the design of a novel intrusion detection system that has the capability to detect intrusions with high accuracy even when complete audit data is not available. In this dissertation, we take a holistic approach to anomaly detection to address the threats posed by network based denial-of-service attacks by proposing improvements in every step of the intrusion detection process. At the data collection phase, we have implemented an adaptive sampling scheme that intelligently samples incoming network data to reduce the volume of traffic sampled, while maintaining the intrinsic characteristics of the network traffic. A Bloom filters based fast flow aggregation scheme is employed at the data pre-processing stage to further reduce the response time of the anomaly detection scheme. Lastly, this dissertation also proposes an expectation-maximization algorithm based anomaly detection scheme that uses the sampled audit data to detect intrusions in the incoming network traffic.

References
  1. Abdul Samad bin Haji Ismail, Abdul Hanan Abdullah, Kamalrulnizam bin Abu Bak, “A Novel Method for Unsupervised Anomaly Detection using Unlabelled Data” IEEE2008.
  2. Nam Hun Park, Won Suk Lee,” Anomaly Detection over Clustering Multi-dimensional Transactional Audit Streams” IEEE2008.
  3. C. C. Aggarwal and P. S. Yu, “Outlier detection for high dimensional data,” in Proceedings of the 2001 ACM SIGMOD international conference on Management of data, T. Sellis, Ed. ACM Press, May 2001, pp. 37 – 46.
  4. R. Agrawal, T. Imielinski, and A. Swami, “Mining association rules between sets of items in large databases,” in In Proceedings of the ACM SIGMOD Conference on Management of Data. ACM Press, 1993, pp. 207–216.
  5. D. Anderson, T. Frivold, A. Tamaru, and A. Valdes, “Next generation intrusion detection expert system (nides), software users manual,” Computer Science Laboratory, SRI International, 333 Ravenswood Avenue, Menlo Park, CA 94025-3493, User Manual SRI–CSL–95–07, 1994.
  6. D. Anderson, T. F. Lunt, H. S. Javitz, A. Tamaru, and A. Valdes, “Detecting unusual program behavior using the statistical component of the next-generation intrusion detection expert system (nides),” Computer Science Laboratory, SRI International, 333 Ravenswood Avenue, Menlo Park, CA 94025-3493, Technical Report SRICSL- 95-06, May 1995.
  7. J. P. Anderson, “Computer security threat monitoring and surveillance,” James P. Anderson Co., Fort Washington, Pennsylvania, Technical Report, April 1980.
  8. S. Axelsson, “Research in intrusion-detection systems: A survey,” In http:// citeseer.ist.psu.edu/axelsson98research.html, Department of Computer Engineering, Chalmers University of Technology, Technical Report 98–17, December 1998.
Index Terms

Computer Science
Information Sciences

Keywords

Network Security Anomaly Detection Intrusion detection Clustering