{"title":"基于距离特征的集成分类器入侵检测系统的设计","authors":"M. Aravind, V. Kalaiselvi","doi":"10.1109/ICSCN.2017.8085661","DOIUrl":null,"url":null,"abstract":"This paper focuses on designing an Intrusion Detection System(IDS), which detects the family of attack in a dataset. An IDS detects various types of malicious traffic and computer usage which cannot be detected by a conventional firewall. In this proposed work, the data is extracted from UNSW_NB15 dataset. To identify the data cluster centers, the k means algorithm is used. A new and one dimensional distance based feature is used to represent each data sample. Following this, an ensemble classifier is used to classify the data. Our algorithm would classify five families of attack viz., Normal, Probe, DOS, U2R and R2L. For each and every classifier output, Training state, Performance, Error histogram, Regression Fit are plotted.","PeriodicalId":383458,"journal":{"name":"2017 Fourth International Conference on Signal Processing, Communication and Networking (ICSCN)","volume":"104 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"10","resultStr":"{\"title\":\"Design of an intrusion detection system based on distance feature using ensemble classifier\",\"authors\":\"M. Aravind, V. Kalaiselvi\",\"doi\":\"10.1109/ICSCN.2017.8085661\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper focuses on designing an Intrusion Detection System(IDS), which detects the family of attack in a dataset. An IDS detects various types of malicious traffic and computer usage which cannot be detected by a conventional firewall. In this proposed work, the data is extracted from UNSW_NB15 dataset. To identify the data cluster centers, the k means algorithm is used. A new and one dimensional distance based feature is used to represent each data sample. Following this, an ensemble classifier is used to classify the data. Our algorithm would classify five families of attack viz., Normal, Probe, DOS, U2R and R2L. For each and every classifier output, Training state, Performance, Error histogram, Regression Fit are plotted.\",\"PeriodicalId\":383458,\"journal\":{\"name\":\"2017 Fourth International Conference on Signal Processing, Communication and Networking (ICSCN)\",\"volume\":\"104 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-03-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"10\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2017 Fourth International Conference on Signal Processing, Communication and Networking (ICSCN)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICSCN.2017.8085661\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 Fourth International Conference on Signal Processing, Communication and Networking (ICSCN)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICSCN.2017.8085661","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Design of an intrusion detection system based on distance feature using ensemble classifier
This paper focuses on designing an Intrusion Detection System(IDS), which detects the family of attack in a dataset. An IDS detects various types of malicious traffic and computer usage which cannot be detected by a conventional firewall. In this proposed work, the data is extracted from UNSW_NB15 dataset. To identify the data cluster centers, the k means algorithm is used. A new and one dimensional distance based feature is used to represent each data sample. Following this, an ensemble classifier is used to classify the data. Our algorithm would classify five families of attack viz., Normal, Probe, DOS, U2R and R2L. For each and every classifier output, Training state, Performance, Error histogram, Regression Fit are plotted.