Abstract
A robust Network Intrusion Detection System (NIDS) has become the need of today’s era. To provide a robust mechanism require to distinguish between normal and anomalous activities, outliers detection with the help of data mining, play an important role in detection and distinction of such activities in the midst of enhanced performance in detection of false alarm. Now day’s researchers focus on applying outlier detection techniques for anomaly detection because of its promising results in discover true attacks and in sinking false alarm rate. So this paper contributed a enhanced mechanism of outlier detection to enhance accuracy in intrusion detection by introducing Density based Outlier detection into Data Mining using Hamming Densities of a data point. Hamming density is k-nearest neighbour divided by Hamming-distance. Analyzed the outcomes of our proposed by doing experiment using UCI repository KDD Cup’99 Intrusion data-set on our simulator work and compare the result with other such existing algorithms like LOF, LOF′ and found more accuracy and increase in detecting the number of true positive alarm in our proposed work.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Gooi, P., et al.: A Survey of Outlier Detection Methods in Network Anomaly Identification (2011). http://www.cs.uccs.edu/~jkalita/papers/2011/GogoiPrasantaComputerJournal.pdf
Rene Beulah, J.: Applying outlier detection techniques in anomaly-based network intrusion systems – a theoretical analysis. In: International Journal of Computer Applications (0975 – 8887), International Seminar on Computer Vision, ISCV 2013, pp. 6–9 (2013)
García-Teodoro, P., Díaz-Verdejo, J., Maciá-Fernández, G., Vázquez, E.: Anomaly-based network intrusion detection: techniques, systems and challenges. Comput. Secur. 28(1–2), 18–28 (2009)
Depren, O., Topallar, M., Anarim, E., Kemal Ciliz, M.: An intelligent intrusion detection system (IDS) for anomaly and misuse detection in computer networks. Expert Syst. Appl. 29, 713–722 (2005). Elsevier
Manandhar, P., Aung, Z.: Intrusion detection based on outlier detection method. In: International Conference on Intelligent Systems, Data Mining and Information Technology, ICIDIT 2014, Bangkok, Thailand, 21–22 April 2014
Chandola, V., Banerjee, A., Kumar, V.: Anomaly detection: a survey. ACM Comput. Surv. 41(3), 15:1–15:58 (2009)
Patel, A., Taghavi, M., Bakhtiyari, K., Ju, J.C.: An intrusion detection and prevention system in cloud computing: a systematic review. J. Netw. Comput. Appl. 36, 25–41 (2013). Elsevier
Chen, C., Lin, X., et al.: ACM, Facebook traffic pattern analytics. In: Proceeding MISNC, SI, DS 2016 Proceedings of the 3rd Multidisciplinary International Social Networks Conference on Social Informatics 2016, Data Science 2016, Article No. 10. ACM, New York, NY, USA ©2016 (2016). doi:10.1145/2955129.2955161. ISBN: 978-1-4503-4129-5
Kumar, N., Jha, G., Sharma, K.G.: Density based outlier detection (DBOD) in data mining: a novel approach. In: International Conference at Central University of Bihar, ICRAMSCS 2015 (2015)
Knorr, E.M., Ng, R.T., Tucakov, V.: Distance-based outliers: algorithms and applications. VLDB J. 8, 237–253 (2000)
Ma, M.X., Ngan, H.Y.T., Liu, W.: Density-based outlier detection by local outlier factor on largescale traffic data. In: 2016 Society for Imaging Science and Technology, IS&T International Symposium on Electronic Imaging 2016 Image Processing: Machine Vision Applications IX, pp. IPMVA-385.1–IPMVA-385.4 (2016). doi:10.2352/ISSN.2470-1173.2016.14.IPMVA-385
Xi, J.: Outlier detection algorithms in data mining. In: Second International Symposium on Intelligent Information Technology Application © 2008 IEEE (2008)
Jiang, Q., Campbell, A., Tang, G., Pei, J.: Multi-level relationship outlier detection. Int. J. Bus. Intell. Data Min. 7(4), 253–273 (2012). doi:10.1504/IJBIDM.2012.051713. Inderscience Publication
Kunaa, H.D., Martinezb, R.G., Villatoroc, F.R.: Outlier detection in audit logs for application systems. Elsevier J. Inf. Syst. 44, 22–33 (2014)
Yao, H., Liu, Y., Fang, C.: An abnormal network traffic detection algorithm based on big data analysis. Int. J. Comput. Commun. Control 11(4), 567–579 (2016). ISSN 1841-9836
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG
About this paper
Cite this paper
Kumar, N., Kumar, U. (2018). Anomaly-Based Network Intrusion Detection: An Outlier Detection Techniques. In: Abraham, A., Cherukuri, A., Madureira, A., Muda, A. (eds) Proceedings of the Eighth International Conference on Soft Computing and Pattern Recognition (SoCPaR 2016). SoCPaR 2016. Advances in Intelligent Systems and Computing, vol 614. Springer, Cham. https://doi.org/10.1007/978-3-319-60618-7_26
Download citation
DOI: https://doi.org/10.1007/978-3-319-60618-7_26
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-60617-0
Online ISBN: 978-3-319-60618-7
eBook Packages: EngineeringEngineering (R0)