期刊文献+

基于K-means聚类特征消减的网络异常检测 被引量:21

K-means based feature reduction for network anomaly detection
原文传递
导出
摘要 针对基础K-means算法在KDD 99数据集中检测罕见攻击效果差且效率低下等问题,该文通过数据统计的方式对数据集中各维度与每类攻击类型的相关分析发现,罕见攻击极易被大量的常见攻击所淹没,而当常见攻击被移去时,这些威胁性更大的罕见攻击则能够被更好地识别出来。基于此,该文提出一种改进的基于K-means分层迭代的检测算法,通过有针对性的特征选择来降低K-means聚类的数据维度,经过多次属性消减的K-means聚类迭代操作可以更加精准地检测到不同异常类型的攻击。在KDD 99数据集上的实验结果表明:该算法对原基础的K-means检测算法难以检测到的罕见攻击类型U2R/R2L攻击检测率几乎达到99%左右。同时随着每次分层迭代聚类维度近50%的降低,进一步节省了约90%的异常检测时间。 Although the basic K-means test was used for anomaly detection in the KDD 99 attack dataset,its accuracy and efficiency for detecting rare attacks needs to be improved.Rare attacks,which are usually greater threats,are easily hidden by common threats so the rare attacks can be more easily identified by removing common attacks.An improved hierarchical iterative K-means method was developed based on this finding to detect all kinds of anomalies using feature reduction through correlations to decrease classification the dimensions.The algorithm is able to detect almost every rare attack with a 99% succesful classification rate and for nearly real-time detection with 90%less computations on the KDD 99 data compared with the basic K-means algorithm.
出处 《清华大学学报(自然科学版)》 EI CAS CSCD 北大核心 2018年第2期137-142,共6页 Journal of Tsinghua University(Science and Technology)
基金 中央高校基本科研业务费项目(2017JBM005)
关键词 异常检测 K-MEANS 特征消减 U2R R2L anomaly detection K-means feature reduction U2R R2L
  • 相关文献

参考文献2

二级参考文献11

  • 1Danzig P B, Obraezka K, Kumar A. An analysis of wide-area name server traffic: A study of the internet domain name system [C]//ACM SIGCOMM Computer Communication Review. New York, 1992, 22(4): 281-292.
  • 2Wessels D, Fomenkov M. Wow, that's a lot of packets [C]//Proc Passive and Active Network Measurement Workshop (PAM). San Diego, 2003.
  • 3Brownlee N, Claffy K, Nemeth E. DNS measurements at a root server [C]//6th Global Internet Symposium. San Antonio, TX, 2001.
  • 4Xu W, Kirkpatrick B, Lacoste-Julien S. Analyzing root DNS traffie [EB/OL] (2004). http://www. eecs. berkeley. edu/ bbkirk/papers/es262a- 2004. pdf.
  • 5Jung J, Sit E, Balakrishnan H, et al. DNS performance and the effectiveness of caching [J]. IEEE/ACM Trans on Networking, 2002, 10(5): 589-603.
  • 6Ishibashi K, Toyono T, Matsuoka H, et al. Measurement of DNS traffic caused by DDoS attack [C]// Proc the Symposium on Applications and the Internet Workshops. Washington, 2005 : 118 - 121.
  • 7Ishibashi K, Toyono T, Toyama K, et al. Detecting mass-mailing worm infected hosts by mining DNS traffic data [C]//Proc the 2005 ACM SIGCOMM Workshop on Mining Network Data. Philadelphia, 2005: 159 - 164.
  • 8Ramaswamy S,Rastogi R,Shim K. Efficiem algorithms for mining outliers from large data sets. In: Proceedings of the ACM SIGMOD International Conference on Management of Data, Dallas, TX, USA, 2000. 427-438
  • 9Portnoy L,Eskin E, Stolfo S J. Intrusion detection withunlabeled data using clustering. In: Proceedings of theACM Workshop on Data Mining Applied to Security,Philadelphia, PA, 2001
  • 10Sequeira K, Zaki M. ADMIT: Anomaly-based data mining for intrusions. In: Proceedings of the 8th ACMSIGKDD International Conference on Knowledge Discovery and Data Mining, Edmonton, Alberta, Canada, 2002. 386-395

共引文献10

同被引文献140

引证文献21

二级引证文献92

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部