Skip to main content

A DGC-Based Data Classification Method Used for Abnormal Network Intrusion Detection

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 4234))

Abstract

The data mining techniques used for extracting patterns that represent abnormal network behavior for intrusion detection is an important research area in network security. This paper introduces the concept of gravitation and gravitation field into data classification by utilizing analogical inference, and studied the method to calculate data gravitation. Based on the theoretical model of data gravitation and data gravitation field, the paper presented a new classification model called Data Gravitation based Classifier (DGC). The proposed approach was applied to an Intrusion Detection System (IDS) with 41 inputs (features). Experimental results show that the proposed method was efficient in data classification and suitable for abnormal detection using netowrk processor-based platforms.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   139.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Allen, J., Christie, A., Fithen, W., McHugh, J., Pickel, J., Stoner, E.: State of the Practice of Intrusion Detection Technologies. CMU/SEI-99-TR-028. Carnegie Mellon Software Engineering Institute (2000)

    Google Scholar 

  2. Qinlan, J.R.: Introduction of decision trees. Machine Learning 1, 86–106 (1986)

    Google Scholar 

  3. Freund, Y.: Boosting a weak learning algorithm by majority. Information Computation 121, 256–285 (1995)

    Article  MATH  MathSciNet  Google Scholar 

  4. Hongjun, L., Rudy, S., Huan, L.: Effect data mining using neural networks. IEEE Transaction on knowledge and data engineering 8(6), 957–961 (1996)

    Article  Google Scholar 

  5. Boser, B.E., Guyon, I.M., Vapnik, V.N.: A trining algorithm for optimal margin classifiers. In: Proceedings of the 5th Annual ACM Workshop on Computational Learning Theory, pp. 144–152. ACM Press, New York (1992)

    Chapter  Google Scholar 

  6. Vapnik, V.N.: The Nature of Statistical Learning Theory. Springer, Heidelberg (1995)

    MATH  Google Scholar 

  7. Pawlak, A.: Rough sets, theoretical aspects of reasoning about data. Kluwer Academic Publishers, Dordrecht (1991)

    MATH  Google Scholar 

  8. Hu, X., Cercone, N.: Data Mining via Discretization, Generalization and Rough Set Feature Selection. Knowl. Inf. Syst. 1(1), 33–60 (1999)

    Google Scholar 

  9. Minz, S., Jain, R.: Rough Set based Decision Tree Model for Classification. In: Kambayashi, Y., Mohania, M., Wöß, W. (eds.) DaWaK 2003. LNCS, vol. 2737, pp. 172–181. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  10. Minz, S., Jain, R.: Hybridized Rough Set Framework for Classification: An Experimental View. In: HIS 2003, pp. 631–640 (2003)

    Google Scholar 

  11. Peters, J.F., Skowron, A.: A Rough Set Approach to Knowledge Discovery. In: 17’th IJIS, pp. 109–112 (2002)

    Google Scholar 

  12. Hu, X.: Using Rough Sets Theory and Database Operations to Construct a Good Ensemble of Classifiers for Data Mining Applications. In: ICDM 2001, pp. 233–240 (2001)

    Google Scholar 

  13. Shi, Y., Song, Y., Zhang, A.: A shrinking-based approach for multi-dimensional data analysis. In: The 29th VLDB conference, Berlin, Germany, September 2003, pp. 440–451 (2003)

    Google Scholar 

  14. Shi, Y., Zhang, A.: A Shrinking-Based Dimension Reduction Approach for Multi-Dimensional Data Analysis. In: The 16th International Conference on Scientific and Statistical Database Management, Santorini Island, Greece (June 2004)

    Google Scholar 

  15. Indulska, M., Orlowska, M.E.: Gravity Based Spatial Clustering. In: ACM Symposium on GIS (2002)

    Google Scholar 

  16. Webster, B., Philip, J.B.: A Local Search Optimization Algorithm Based on Natural Principles of Gravitation. In: IKE 2003, Las Vegas, Nevada, USA, June 2003, vol. 1, pp. 255–261. CSREA Press (2003)

    Google Scholar 

  17. Peng, L., Chen, Y., Yang, B., Chen, Z.: A Novel Classification Method Based on Data Gravitation. In: Proc. of International Conference on Neural Networks and Brain (ICNN&B), pp. 667–672 (2005)

    Google Scholar 

  18. MacQueen, J.: Some methods for classification and analysis of multivariate observations. In: Proceedings Fifth Berkeley Symposium on Math. Stat. and Prob., pp. 281–297. University of California Press (1967)

    Google Scholar 

  19. KDD cup 99 Intrusion Detection Data Set, online at http://kdd.ics.uci.edu/database/kddcup99/kddcup.data_10_percent.gz

  20. Agrawal, R., Gehrke, J., Gunopulos, D., Raghavan, P.: Automatic Subspace Clustering of High dimensional Data for Data Mining Applications. In: Proc. ACM SIGMOD’98 Int.Conf. on Management of Data, Seattle, WA, pp. 94–105 (1998)

    Google Scholar 

  21. Quinlan, J.R.: C4.5: Program for Machine Learning. Morgan Kaufmann, San Francisco (1993)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Yang, B., Peng, L., Chen, Y., Liu, H., Yuan, R. (2006). A DGC-Based Data Classification Method Used for Abnormal Network Intrusion Detection. In: King, I., Wang, J., Chan, LW., Wang, D. (eds) Neural Information Processing. ICONIP 2006. Lecture Notes in Computer Science, vol 4234. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11893295_24

Download citation

  • DOI: https://doi.org/10.1007/11893295_24

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-46484-6

  • Online ISBN: 978-3-540-46485-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics