International Journal of Computer Applications |
Foundation of Computer Science (FCS), NY, USA |
Volume 9 - Number 9 |
Year of Publication: 2010 |
Authors: Shailesh Kumar Gaikwad, Prof. Vijay Shah, Yogendra Kumar Jain |
10.5120/1416-1912 |
Shailesh Kumar Gaikwad, Prof. Vijay Shah, Yogendra Kumar Jain . Article:A Secure Network Detection System against Noisy Unlabeled Data. International Journal of Computer Applications. 9, 9 ( November 2010), 7-11. DOI=10.5120/1416-1912
Today, the Internet along with the corporate network plays a major role in creating and advancing new business avenues. With the ever increasing deployment and usage of gigabit networks, traditional network anomaly detection based intrusion detection systems have not scaled accordingly. Most, if not all, systems deployed assume the availability of complete and clean data for the purpose of intrusion detection. We contend that this assumption is not valid. Factors like noise in the audit data, mobility of the nodes, and the large amount of data generated by the network make it difficult to build a normal traffic profile of the network for the purpose of anomaly detection. From this perspective, the leitmotif of the research effort described in this dissertation is the design of a novel intrusion detection system that has the capability to detect intrusions with high accuracy even when complete audit data is not available. In this dissertation, we take a holistic approach to anomaly detection to address the threats posed by network based denial-of-service attacks by proposing improvements in every step of the intrusion detection process. At the data collection phase, we have implemented an adaptive sampling scheme that intelligently samples incoming network data to reduce the volume of traffic sampled, while maintaining the intrinsic characteristics of the network traffic. A Bloom filters based fast flow aggregation scheme is employed at the data pre-processing stage to further reduce the response time of the anomaly detection scheme. Lastly, this dissertation also proposes an expectation-maximization algorithm based anomaly detection scheme that uses the sampled audit data to detect intrusions in the incoming network traffic.