Title :
CluSID: a clustering scheme for intrusion detection improved by information theory
Author :
Shokri, Reza ; Oroumchian, Farhad ; Yazdani, Nasser
Author_Institution :
Dept. of ECE, Tehran Univ., Iran
Abstract :
Security is a big issue for all networks in any enterprise environment. Many solutions have been proposed to secure the network infrastructure and communication over the Internet. Intrusion detection systems with many different techniques such as data mining approaches are employed to maximize the detection rate of intrusions while reducing false alarm rate. For instance, many clustering techniques are recommended which segregate normal and abnormal data in IDSs. Clustering methods put emphasis on finding differences and similarities of traffic sessions to categorize each one in its corresponding groups. These groups are represented by their assigned labels. Later, these labels are used to predict the type of the incoming network traffic. In this paper, we propose a clustering scheme to use in intrusion detection systems, named CluSID. The major contribution of CluSID is using information theory for taking full advantages of clustering techniques. The main logic behind CluSID is to use non-uniform gain functions for network traffic features in order to improve the accuracy of clustering process. To this end, we apply information theory concepts for moving center of clusters to the most important areas in the domain of the selected features. The results clearly show a raise in detection rate of CluSID in most of the attack categories in comparison to KDD CUP´99 Winner and simple clustering methods. The increase in detection rate of proposed system is about 25 percent.
Keywords :
Internet; security of data; Internet; clustering scheme; data mining; information theory; intrusion detection system; network traffic; Clustering methods; Communication system security; Data mining; Data security; IP networks; Information security; Information theory; Intrusion detection; Logic; Telecommunication traffic; Clustering; Entropy; Information Theory; Intrusion Detecfion System;
Conference_Titel :
Networks, 2005. Jointly held with the 2005 IEEE 7th Malaysia International Conference on Communication., 2005 13th IEEE International Conference on
Print_ISBN :
1-4244-0000-7
DOI :
10.1109/ICON.2005.1635546