Authors
Iwan Syarif, Adam Prugel-Bennett, Gary Wills
Publication date
2012
Conference
Networked Digital Technologies: 4th International Conference, NDT 2012, Dubai, UAE, April 24-26, 2012. Proceedings, Part I 4
Pages
135-145
Publisher
Springer Berlin Heidelberg
Description
This paper describes the advantages of using the anomaly detection approach over the misuse detection technique in detecting unknown network intrusions or attacks. It also investigates the performance of various clustering algorithms when applied to anomaly detection. Five different clustering algorithms: k-Means, improved k-Means, k-Medoids, EM clustering and distance-based outlier detection algorithms are used. Our experiment shows that misuse detection techniques, which implemented four different classifiers (naïve Bayes, rule induction, decision tree and nearest neighbour) failed to detect network traffic, which contained a large number of unknown intrusions; where the highest accuracy was only 63.97% and the lowest false positive rate was 17.90%. On the other hand, the anomaly detection module showed promising results where the distance-based outlier detection algorithm outperformed …
Total citations
2013201420152016201720182019202020212022202320241514171117163943363421
Scholar articles
I Syarif, A Prugel-Bennett, G Wills - … Technologies: 4th International Conference, NDT 2012 …, 2012