Skip to main content

Anomaly-Based Network Intrusion Detection: An Outlier Detection Techniques

  • Conference paper
  • First Online:
Proceedings of the Eighth International Conference on Soft Computing and Pattern Recognition (SoCPaR 2016) (SoCPaR 2016)

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 614))

Included in the following conference series:

Abstract

A robust Network Intrusion Detection System (NIDS) has become the need of today’s era. To provide a robust mechanism require to distinguish between normal and anomalous activities, outliers detection with the help of data mining, play an important role in detection and distinction of such activities in the midst of enhanced performance in detection of false alarm. Now day’s researchers focus on applying outlier detection techniques for anomaly detection because of its promising results in discover true attacks and in sinking false alarm rate. So this paper contributed a enhanced mechanism of outlier detection to enhance accuracy in intrusion detection by introducing Density based Outlier detection into Data Mining using Hamming Densities of a data point. Hamming density is k-nearest neighbour divided by Hamming-distance. Analyzed the outcomes of our proposed by doing experiment using UCI repository KDD Cup’99 Intrusion data-set on our simulator work and compare the result with other such existing algorithms like LOF, LOF′ and found more accuracy and increase in detecting the number of true positive alarm in our proposed work.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Gooi, P., et al.: A Survey of Outlier Detection Methods in Network Anomaly Identification (2011). http://www.cs.uccs.edu/~jkalita/papers/2011/GogoiPrasantaComputerJournal.pdf

  2. Rene Beulah, J.: Applying outlier detection techniques in anomaly-based network intrusion systems – a theoretical analysis. In: International Journal of Computer Applications (0975 – 8887), International Seminar on Computer Vision, ISCV 2013, pp. 6–9 (2013)

    Google Scholar 

  3. García-Teodoro, P., Díaz-Verdejo, J., Maciá-Fernández, G., Vázquez, E.: Anomaly-based network intrusion detection: techniques, systems and challenges. Comput. Secur. 28(1–2), 18–28 (2009)

    Article  Google Scholar 

  4. Depren, O., Topallar, M., Anarim, E., Kemal Ciliz, M.: An intelligent intrusion detection system (IDS) for anomaly and misuse detection in computer networks. Expert Syst. Appl. 29, 713–722 (2005). Elsevier

    Article  Google Scholar 

  5. Manandhar, P., Aung, Z.: Intrusion detection based on outlier detection method. In: International Conference on Intelligent Systems, Data Mining and Information Technology, ICIDIT 2014, Bangkok, Thailand, 21–22 April 2014

    Google Scholar 

  6. Chandola, V., Banerjee, A., Kumar, V.: Anomaly detection: a survey. ACM Comput. Surv. 41(3), 15:1–15:58 (2009)

    Article  Google Scholar 

  7. Patel, A., Taghavi, M., Bakhtiyari, K., Ju, J.C.: An intrusion detection and prevention system in cloud computing: a systematic review. J. Netw. Comput. Appl. 36, 25–41 (2013). Elsevier

    Article  Google Scholar 

  8. Chen, C., Lin, X., et al.: ACM, Facebook traffic pattern analytics. In: Proceeding MISNC, SI, DS 2016 Proceedings of the 3rd Multidisciplinary International Social Networks Conference on Social Informatics 2016, Data Science 2016, Article No. 10. ACM, New York, NY, USA ©2016 (2016). doi:10.1145/2955129.2955161. ISBN: 978-1-4503-4129-5

  9. Kumar, N., Jha, G., Sharma, K.G.: Density based outlier detection (DBOD) in data mining: a novel approach. In: International Conference at Central University of Bihar, ICRAMSCS 2015 (2015)

    Google Scholar 

  10. Knorr, E.M., Ng, R.T., Tucakov, V.: Distance-based outliers: algorithms and applications. VLDB J. 8, 237–253 (2000)

    Article  Google Scholar 

  11. Ma, M.X., Ngan, H.Y.T., Liu, W.: Density-based outlier detection by local outlier factor on largescale traffic data. In: 2016 Society for Imaging Science and Technology, IS&T International Symposium on Electronic Imaging 2016 Image Processing: Machine Vision Applications IX, pp. IPMVA-385.1–IPMVA-385.4 (2016). doi:10.2352/ISSN.2470-1173.2016.14.IPMVA-385

  12. Xi, J.: Outlier detection algorithms in data mining. In: Second International Symposium on Intelligent Information Technology Application © 2008 IEEE (2008)

    Google Scholar 

  13. Jiang, Q., Campbell, A., Tang, G., Pei, J.: Multi-level relationship outlier detection. Int. J. Bus. Intell. Data Min. 7(4), 253–273 (2012). doi:10.1504/IJBIDM.2012.051713. Inderscience Publication

    Article  Google Scholar 

  14. Kunaa, H.D., Martinezb, R.G., Villatoroc, F.R.: Outlier detection in audit logs for application systems. Elsevier J. Inf. Syst. 44, 22–33 (2014)

    Article  Google Scholar 

  15. Yao, H., Liu, Y., Fang, C.: An abnormal network traffic detection algorithm based on big data analysis. Int. J. Comput. Commun. Control 11(4), 567–579 (2016). ISSN 1841-9836

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Neeraj Kumar .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG

About this paper

Cite this paper

Kumar, N., Kumar, U. (2018). Anomaly-Based Network Intrusion Detection: An Outlier Detection Techniques. In: Abraham, A., Cherukuri, A., Madureira, A., Muda, A. (eds) Proceedings of the Eighth International Conference on Soft Computing and Pattern Recognition (SoCPaR 2016). SoCPaR 2016. Advances in Intelligent Systems and Computing, vol 614. Springer, Cham. https://doi.org/10.1007/978-3-319-60618-7_26

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-60618-7_26

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-60617-0

  • Online ISBN: 978-3-319-60618-7

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics