Abstract
In this work, a new approach for intrusion detection in computer networks is introduced. Using the KDD Cup 99 dataset as a benchmark, the proposed method consists of a combination between feature selection methods and a novel local classification method. This classification method –called FVQIT (Frontier Vector Quantization using Information Theory)– uses a modified clustering algorithm to split up the feature space into several local models, in each of which the classification task is performed independently. The method is applied over the KDD Cup 99 dataset, with the objective of improving performance achieved by previous authors. Experimental results obtained indicate the adequacy of the proposed approach.
This work was supported in part by Spanish Ministerio de Ciencia e Innovación under Project Code TIN 2006-02402, partially supported by the European Union ERDF, and by Xunta de Galicia under Project Code 08TIC012105PR.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Verwoerd, T., Hunt, R.: Intrusion Detection Techniques and Approaches. Computer Communications 25(15), 1356–1365 (2002)
Elkan, C.: Results of the KDD 1999 Classifier Learning. ACM SIGKDD Explorations Newsletter 1(2), 63–64 (2000)
Bolon-Canedo, V., Sanchez-Maroño, N., Alonso-Betanzos, A.: A Combination of Discretization and Filter Methods for Improving Classification Performance in KDD Cup 1999 Dataset. In: Proceedings of the International Joint Conference on Neural Networks, IJCNN (in press, 2009)
Martinez-Rego, D., Fontenla-Romero, O., Porto-Diaz, I., Alonso-Betanzos, A.: A New Supervised Local Modelling Classifier Based on Information Theory. In: Proceedings of the International Joint Conference on Neural Networks, IJCNN (in press, 2009)
Guyon, I., Gunn, S., Nikravesh, M., Zadeh, L.: Feature Extraction. In: Foundations and Applications. Springer, Heidelberg (2006)
Zhao, Z., Liu, H.: Searching for Interacting Features. In: Proceedings of International Joint Conference on Artificial Intelligence, IJCAI, pp. 1156–1167 (2007)
Dash, M., Liu, H.: Consistency-based Search in Feature Selection. Artificial Intelligence Journal 151(1-2), 155–176 (2003)
Press, W.H., Flannery, B.P., Teutolsky, S.A., Vetterling, W.T.: Numerical Recpies in C. Cambridge University Press, Cambridge (1988)
Yang, N., Webb, G.I.: Proportional k-Interval Discretization for Naive-Bayes Classifiers. In: EMCL 2001: Proceedings of the 12th European Conference on Machine Learning, pp. 564–575. Springer, Heidelberg (2001)
Fayyad, U.M., Irani, K.B.: Multi-Interval Discretization of Continuous-Valued Attributes for Classification Learning. In: Proceedings of the 13th International Joint Conference on Artificial Intelligence, pp. 1022–1029. Morgan Kaufmann, San Francisco (1993)
Grunwald, P.: The Minimum Description Length Principle and Reasoning Under Uncertainty. Unpublished Doctoral Dissertation, University of Amsterdam (1998)
Principe, J., Lehn-Schioler, T., Hedge, A., Erdogmus, D.: Vector-Quantization Using Information Theoretic Concepts. Natural Computing 4, 39–51 (2005)
Castillo, E., Fontenla-Romero, O., Guijarro-Berdiñas, B., Alonso-Betanzos, A.: A global optimum approach for one-layer neural networks. Neural Computation 14(6), 1429–1449 (2002)
DARPA 1998 Dataset, http://www.ll.mit.edu/mission/communications/ist/corpora/ideval/index.html (cited, March 2009)
Levin, I.: KDD 1999 Classifier Learning Contest LLSoft’s Results Overview. ACM SIGKDD Explorations Newsletter 1(2), 67–75 (2000)
Fugate, M., Gattiker, J.R.: Computer Intrusion Detection with Classification and Anomaly Detection, using SVMs. International Journal of Pattern Recognition and Artificial Intelligence 17(3), 441–458 (2003)
Alonso-Betanzos, A., Sanchez-Maroño, N., Carballal-Fortes, F.M., Suarez-Romero, J., Perez-Sanchez, B.: Classification of Computer Intrusions Using Fuctional Networks. A Comparative Study. In: ESANN 2007: Proceedings of the European Symposium on Artificial Neural Networks, pp. 25–27 (2007)
Sabhnani, M., Serpen, G.: Why Machine Learning Algorithms Fail in Misuse Detection on KDD Intrusion Detection Data Set. Intelligent Data Analysis 8(4), 403–415 (2004)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Porto-Díaz, I., Martínez-Rego, D., Alonso-Betanzos, A., Fontenla-Romero, O. (2009). Combining Feature Selection and Local Modelling in the KDD Cup 99 Dataset. In: Alippi, C., Polycarpou, M., Panayiotou, C., Ellinas, G. (eds) Artificial Neural Networks – ICANN 2009. ICANN 2009. Lecture Notes in Computer Science, vol 5768. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-04274-4_85
Download citation
DOI: https://doi.org/10.1007/978-3-642-04274-4_85
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-04273-7
Online ISBN: 978-3-642-04274-4
eBook Packages: Computer ScienceComputer Science (R0)