Skip to main content

An Evaluation of Intrusion Detection System on Jubatus

  • Conference paper
Progress in Systems Engineering

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 366))

  • 3083 Accesses

Abstract

The network intrusion is becoming a big threat for a lot of companies, organization and so on. Recent intrusions are becoming more clever and difficult to detect. Many of today’s intrusion detection systems are based on signature-based. They have good performance for known attacks, but theoretically they are not able to detect unknown attacks. On the other hand, an anomaly detection system can detect unknown attacks and is getting focus recently. In this paper, we study the effectiveness and the performance experiments of one of the major anomaly detection scales, LOF, on distributed online machine learning framework, Jubatus.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 329.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Chandola, V., Banerjee, A. & Kumar, V.: Anomaly Detection: A Survey. In:ACM Computing Surveys, July.41(3). (2009)

    Google Scholar 

  2. Breunig, M. M., Kriegel, H.-P., Ng, R. T. & Sander, J.,: LOF: Identifying Density-Based Local Outliers. In: Proc. ACM SIGMOD 2000 Int. Conf. On Management of Data (2000)

    Google Scholar 

  3. Jubatus, http://jubat.us/

  4. Lazarevic, A. et al., : A Comparative Study of Anomaly Detection Schemes in Network Intrusion Detection. In: Proceedings of SIAM Conference on Data Mining (2003)

    Google Scholar 

  5. Hawkins, D. M.: Identification of Outliers. London: Chapman and Hall. (1980)

    Google Scholar 

  6. hadoop, http://hadoop.apache.org/

  7. KDDCup1999, https://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html

  8. Aleksandar, L. et al.: A Comparative Study of Anomaly Detection Schemes in Network Intrusion Detection. In: Proceedings of the Third SIAM International Conference on Data Mining. (2003)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Tadashi Ogino .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Ogino, T. (2015). An Evaluation of Intrusion Detection System on Jubatus. In: Selvaraj, H., Zydek, D., Chmaj, G. (eds) Progress in Systems Engineering. Advances in Intelligent Systems and Computing, vol 366. Springer, Cham. https://doi.org/10.1007/978-3-319-08422-0_53

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-08422-0_53

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-08421-3

  • Online ISBN: 978-3-319-08422-0

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics