Evolutionary Optimization on Misuse and Anomaly IDS Using LOF-based Clustering
碩士 === 國立臺灣大學 === 資訊工程學研究所 === 94 === With wide application of internet, various attack techniques have been developed and threaten the e-society. Old passive safeguard, e.g. firewall, and password, is insufficient when the attack techniques progress continuously. Hence, intrusion detection system...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | en_US |
Published: |
2006
|
Online Access: | http://ndltd.ncl.edu.tw/handle/95567730186465169953 |
id |
ndltd-TW-094NTU05392061 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-094NTU053920612015-12-16T04:38:21Z http://ndltd.ncl.edu.tw/handle/95567730186465169953 Evolutionary Optimization on Misuse and Anomaly IDS Using LOF-based Clustering 以LOF為基礎的叢集分析及演進最佳化之不當使用和異常行為入侵偵測系統 Chun-Hao Chen 陳俊豪 碩士 國立臺灣大學 資訊工程學研究所 94 With wide application of internet, various attack techniques have been developed and threaten the e-society. Old passive safeguard, e.g. firewall, and password, is insufficient when the attack techniques progress continuously. Hence, intrusion detection system (IDS) is developed for active protection. Using data mining technique to develop IDS is automatic and effective; therefore it can replace traditional signature-based IDS. IDS can be classified into misuse detection and anomaly detection. Misuse detection uses those patterns of known attacks to match and identify intrusions. Anomaly detection constructs normal behavior profiles to detect attacks. This thesis proposes an IDS both for misuse detection and anomaly detection. We extend an excellent outlier detection algorithm LOF to a clustering algorithm. LOF can detect some outliers that other algorithms can not detect. Though there are several common concepts between outlier detection and clustering, the original LOF algorithm can not explicitly form clusters. We make extension to it and apply to IDS. The part of clustering can build the information of training data and find the association between training data and testing data; and the part of outlier detection can detect the unseen attacks if the data deviate from the distribution of training data. Besides, a genetic algorithm is used to assign each feature of data an importance (weight), and generate several sets of weights in terms of characteristics of each attack type. This is adopted to raise the accuracy of IDS. In experiments, the KDD Cup 1999 data is used to evaluate our system. We get good results both for misuse detection and anomaly detection. 李秀惠 2006 學位論文 ; thesis 50 en_US |
collection |
NDLTD |
language |
en_US |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 國立臺灣大學 === 資訊工程學研究所 === 94 === With wide application of internet, various attack techniques have been developed and threaten the e-society. Old passive safeguard, e.g. firewall, and password, is insufficient when the attack techniques progress continuously. Hence, intrusion detection system (IDS) is developed for active protection. Using data mining technique to develop IDS is automatic and effective; therefore it can replace traditional signature-based IDS. IDS can be classified into misuse detection and anomaly detection. Misuse detection uses those patterns of known attacks to match and identify intrusions. Anomaly detection constructs normal behavior profiles to detect attacks.
This thesis proposes an IDS both for misuse detection and anomaly detection. We extend an excellent outlier detection algorithm LOF to a clustering algorithm. LOF can detect some outliers that other algorithms can not detect. Though there are several common concepts between outlier detection and clustering, the original LOF algorithm can not explicitly form clusters. We make extension to it and apply to IDS. The part of clustering can build the information of training data and find the association between training data and testing data; and the part of outlier detection can detect the unseen attacks if the data deviate from the distribution of training data. Besides, a genetic algorithm is used to assign each feature of data an importance (weight), and generate several sets of weights in terms of characteristics of each attack type. This is adopted to raise the accuracy of IDS. In experiments, the KDD Cup 1999 data is used to evaluate our system. We get good results both for misuse detection and anomaly detection.
|
author2 |
李秀惠 |
author_facet |
李秀惠 Chun-Hao Chen 陳俊豪 |
author |
Chun-Hao Chen 陳俊豪 |
spellingShingle |
Chun-Hao Chen 陳俊豪 Evolutionary Optimization on Misuse and Anomaly IDS Using LOF-based Clustering |
author_sort |
Chun-Hao Chen |
title |
Evolutionary Optimization on Misuse and Anomaly IDS Using LOF-based Clustering |
title_short |
Evolutionary Optimization on Misuse and Anomaly IDS Using LOF-based Clustering |
title_full |
Evolutionary Optimization on Misuse and Anomaly IDS Using LOF-based Clustering |
title_fullStr |
Evolutionary Optimization on Misuse and Anomaly IDS Using LOF-based Clustering |
title_full_unstemmed |
Evolutionary Optimization on Misuse and Anomaly IDS Using LOF-based Clustering |
title_sort |
evolutionary optimization on misuse and anomaly ids using lof-based clustering |
publishDate |
2006 |
url |
http://ndltd.ncl.edu.tw/handle/95567730186465169953 |
work_keys_str_mv |
AT chunhaochen evolutionaryoptimizationonmisuseandanomalyidsusinglofbasedclustering AT chénjùnháo evolutionaryoptimizationonmisuseandanomalyidsusinglofbasedclustering AT chunhaochen yǐlofwèijīchǔdecóngjífēnxījíyǎnjìnzuìjiāhuàzhībùdāngshǐyònghéyìchángxíngwèirùqīnzhēncèxìtǒng AT chénjùnháo yǐlofwèijīchǔdecóngjífēnxījíyǎnjìnzuìjiāhuàzhībùdāngshǐyònghéyìchángxíngwèirùqīnzhēncèxìtǒng |
_version_ |
1718150398292787200 |