Abstract
It is an important issue for the security of network that how to detect new intrusions attack. This paper investigates unsupervised intrusion detection method. A distance definition for mixed attributes, a simple method calculating cluster radius threshold, a outlier factor measured deviating degree of a cluster, and a novel intrusion detection method are proposed in this paper. The experimental results show that the method has promising performance with high detection rate and low false alarm rate, also can detect new intrusion.
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
Yamanishi, K., Takeuchi, J., Williams, G.: On-line unsupervised outlier detection using finite mixtures with discounting learning algorithms. In: Proceedings of the Sixth ACM SIGKDD 2000, Boston, MA, USA, pp. 320–324 (2000)
Yamanishi, K., Takeuchi, J.: Discovering outlier filtering rules from unlabeled data: combining a supervised learner with an unsupervised learner. In: Proceedings of the seventh ACM SIGKDD international conference on Knowledge discovery and data mining (2001)
Portnoy, L., Eskin, E., Stolfo, S.J.: Intrusion Detection with Unlabeled Data using Clustering. In: Proceedings of ACM CSS Workshop on Data Mining Applied to Security (DMSA 2001), Philadelphia, PA, November 5-8 (2001)
Eskin, E., Arnold, A., Prerau, M., Portnoy, L., Stolfo, S.: A geometric framework for unsu-pervised anomaly detection: Detecting intrusions in unlabeled data. In: Data Mining for Se-curity Applications (2002)
Charles Elkan .Results of the KDD’99 Classifier Learning Contest, http://www.cs.ucsd.edu/users/elkan/clresults.html
Merz, C.J., Merphy, P.: UCI repository of machine learning databases, http://www.ics.uci.edu/mlearn/MLRRepository.html
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2004 IFIP International Federation for Information Processing
About this paper
Cite this paper
Jiang, S., Li, Q., Wang, H. (2004). A Novel Intrusion Detection Method. In: **, H., Gao, G.R., Xu, Z., Chen, H. (eds) Network and Parallel Computing. NPC 2004. Lecture Notes in Computer Science, vol 3222. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-30141-7_64
Download citation
DOI: https://doi.org/10.1007/978-3-540-30141-7_64
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-23388-6
Online ISBN: 978-3-540-30141-7
eBook Packages: Springer Book Archive