Open Access Open Access  Restricted Access Subscription or Fee Access

Network Intrusion Detection System Using PCA by Lp-Norm Maximization Based on Conjugate Gradient


(*) Corresponding author


Authors' affiliations


DOI: https://doi.org/10.15866/irecos.v11i1.8370

Abstract


Due to the fast growing of computer networks the potential for attacking those networks also became important. Therefore, all enterprises should implement various systems that supervise their network infrastructure security. To detect any eventual attacks, many Intrusion Detection Systems (IDSs) have been used in recent years. However, the most of them operate more often on enormous network traffic data with multiple redundant features. As a result, the IDS generates a high false alarms rate, which makes the intrusion detection inefficient and imprecise. To overcome that, several techniques for data dimensionality reduction have been proposed, such as Principal Component Analysis (PCA). Nonetheless, the classical PCA approach that is based on the L2-norm maximization is very sensitive to outliers. As a solution to this weakness, we propose to introduce a new variant of PCA called PCA Lp-norm using conjugate gradient algorithm to solve the Lp-norm optimization problem. The main idea behind this new method relies on the Lp-norm, which is more robust to the presence of outliers in data. Extensive experiments on two well-known datasets namely KDDcup99 and NSL-KDD prove the effectiveness of the proposed approach in terms of network attacks detection, false alarms reduction and CPU time minimization.
Copyright © 2016 Praise Worthy Prize - All rights reserved.

Keywords


IDS; PCA; Conjugate Gradient; NSL-KDD; Kddcup99

Full Text:

PDF


References


Kumar, S., Spafford, E., A software architecture to support misuse intrusion detection, Proceedings of the 18th National Information Security Conference (Pages: 194-204 Year of Publication: 1995).

B. Caswell, J. Beale, Snort 2.1 intrusion detection (Syngress, 2004).
http://dx.doi.org/10.1016/b978-193183604-3/50012-6

J. P. Anderson, Computer security threat monitoring and surveillance, Fort Washington, Pennsylvania, Tech. Rep., 1980.

D. E. Denning, An intrusion-detection model, IEEE Transactions on Software Engineering, n. 2, pp. 222-232, 1987.
http://dx.doi.org/10.1109/tse.1987.232894

T. Lunt, A. Tamaru, F. Gilham, R. Jagannathan, C. Jalali, H. Javitz, A. Valdes, P. Neumann, and T. Garvey, A real-time intrusion-detection expert system (ides), Computer Science Laboratory, SRI International, Menlo Park, California,, Tech. Rep., 1992.

Porras, P. A., Neumann, P. G., Emerald: Event monitoring enabling response to anomalous live disturbances, Proceedings of the 20th national information systems security conference (Pages: 353-365 Year of Publication: 1997).

Mohamed Mubarak, T., Sajitha, M., Appa Rao, G., Sattar, S., Secure and Energy Efficient Intrusion Detection in 3D WSN, (2014) International Journal on Information Technology (IREIT), 2 (2), pp. 48-55.
http://dx.doi.org/10.1007/978-3-642-22720-2_10

Mohamed Mubarak, T., Appa Rao, G., Sattar, S.A., Sajitha, M., Efficient intrusion detection ensuring connectivity in 2D and 3D WSN, (2014) International Review on Computers and Software (IRECOS), 9 (2), pp. 219-229.

Deepa, A.J., Kavitha, V., Neurofuzzy and genetic network programming based intrusion detection system, (2014) International Review on Computers and Software (IRECOS), 9 (2), pp. 295-301.

Bouzida, Y., Cuppens, N., Cuppens-Boulahia, N., Gombault, S., Efficient intrusion detection using principal component analysis, 3eme conference sur la Sécuritéet Architectures Réseaux (SAR) (Year of Publication: 2004).

M.-L. Shyu, S.-C. Chen, K. Sarinnapakorn, and L. Chang, A novel anomaly detection scheme based on principal component classifier, Miami University, Dept of electrical and computer engineering, Tech. Rep., 2003.

Wang, W., Battiti, R., Identifying intrusions in computer networks with principal component analysis, Proceedings of The First International Conference on Availability, Reliability and Security, ARES (Pages: 8-pp Year of Publication: 2006 ).
http://dx.doi.org/10.1109/ares.2006.73

H. Xu, C. Caramanis, and S. Mannor, Outlier-robust pca: The highdimensional case, IEEE Transactions on Information Theory, vol. 59, no. 1, pp. 546–572, 2013.
http://dx.doi.org/10.1109/tit.2012.2212415

C. Pascoal, M. Oliveira, A. Pacheco, and R. Valadas, Detection of outliers using robust principal component analysis: A simulation study, Combining Soft Computing and Statistical Methods in Data Analysis. Springer, pp. 499–507, 2010
http://dx.doi.org/10.1007/978-3-642-14746-3_62

N. Kwak, Principal component analysis based on l1-norm maximization, IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 30, no. 9, pp. 1672–1680, 2008.
http://dx.doi.org/10.1109/tpami.2008.114

N. Kwak, Principal component analysis by lp-norm maximization, IEEE Transactions on, Cybernetics, vol. 44, no. 5, pp. 594–609, May 2014.
http://dx.doi.org/10.1109/tcyb.2013.2262936

R. Fletcher, C. M. Reeves, Function minimization by conjugate gradients, The computer journal, vol. 7, no. 2, pp. 149–154, 1964.
http://dx.doi.org/10.1093/comjnl/7.2.149

KDD database web site http://kdd.ics.uci.edu/databases/kddcup99/

NSL-KDD web site : http://nsl.cs.unb.ca/NSL-KDD/

M. Tavallaee, E. Bagheri, W. Lu, and A. A. Ghorbani, ”A Detailed Analysis of the KDD CUP 99 Data Set” In Proceeding of the 2009 IEEE symposium on computational Intelligence in security and defense application (CISDA), 2009.
http://dx.doi.org/10.1109/cisda.2009.5356528


Refbacks




Please send any question about this web site to info@praiseworthyprize.com
Copyright © 2005-2024 Praise Worthy Prize