Intrusion Detection Using ML
Intrusion Detection Using ML
–
x13 num_compromised continuous x34 dst_host_same_srv_rate continuous
x14
x15
root_shell
su_attempted
continuous
continuous
x35
x36
dst_host_diff_srv_rate
dst_host_same_src_port_rate
continuous
continuous
Remote to User (R2L),
x16 num_root continuous x37 dst_host_srv_diff_host_rate continuous
x17
x18
num_file_creations
num_shells
continuous
continuous
x38
x39
dst_host_serror_rate
dst_host_srv_serror_rate
continuous
continuous
– User to Root (U2R), and
x19 num_access_files continuous x40 dst_host_rerror_rate continuous
x20
x21
num_outbound_cmds
is_host_login
continuous
discrete
x41 dst_host_srv_rerror_rate continuous – Probing
• The original data contain 744
MB data with 4,940,000
records.
• The data set has 41 attributes
for each connection record
plus one class label.
Anomaly Detection Systems
Three main parts in anomaly detection system
are:
1. Feature selection
2. Model of normal behavior
3. Comparison
Machine Learning Techniques:
1. Single Classifiers
2. Hybrid Classifiers
3. Ensemble Classifiers
Single Classifiers
K-Nearest Neighbors (k-NN)
Computes the approximate distance between
different points on the input vectors and assigns
the unlabeled point to the class of its K-nearest
neighbors. The k parameter affects performance
and accuracy.
k-NN is instance based learning. It contains no
model training stage; only searches for examples
of input vectors and classifies new distances.
• Liao, Y., & Vemuri, V. R. (2002). Use of K-
nearest neighbor classifier for intrusion
detection. Computer and Security, 21(5), 439–
448.
• Li, Y., & Guo, L. (2007). An active learning
based TCM-KNN algorithm for supervised
network intrusion detection. Computer and
Security, 26, 459–467.
Single Classifiers
Support Vector Machines (SVM)
SVM maps the input vector into a higher
dimensional feature space and obtains an
optimal separating hyper-plane in the higher
dimensional hyper plane. The decision boundary
is determined by support vectors and extremely
robust to outliers.
• Chen, W.-H., Hsu, S.-H., & Shen, H.-P. (2005). Application of SVM and ANN
for intrusion detection. Computer and Operations Research, 32, 2617–
2634.
• Heller, K. A., Svore, K. M., Keromytis, A. D., & Stolfo, S. J. (2003). One class
support vector machines for detecting anomalous window registry
accesses. In Paper presented at the 3rd IEEE conference data mining
workshop on data mining for computer security. Florida.
• Khan, L., Awad, M., & Thuraisingham, B. (2007). A new intrusion detection
system using support vector machines and hierarchical clustering. The
VLDB Journal, 16, 507–521.
• Tian, M., Chen, S. -C., Zhuang, Y., & Liu, J. (2004). Using statistical analysis
and support vector machine classification to detect complicated attacks. In
Paper presented at the proceedings of the third international conference
on machine learning and cybernetics. Shanghai.
Single Classifiers
Artificial Neural Networks
Information is processed in units that mimic
neurons. Multi-Layer Perceptron: Consists of an
input layer including a set of sensory nodes as
input nodes, one or more hidden layers of
computation nodes and an output layer. Each
interconnection has a scalar weight associated
with it that is calculated during the training
phase.
Artificial Neural Networks
Chen, Y., Abraham, A., & Yang, B. (2007). Hybrid flexible neural-tree-based intrusion
detection systems. International Journal of Intelligent Systems, 22, 337–352.
• Chen, Y., Abraham, A., & Yang, B. (2007). Hybrid flexible neural-tree-based
intrusion detection systems. International Journal of Intelligent Systems,
22, 337–352.
• Joo, D., Hong, T., & Han, I. (2003). The neural network models for IDS based
on the asymmetric costs of false negative errors and false positive errors.
Expert System with Applications, 25, 69–75.
• Liu, G., Yi, Z., & Yang, S. (2007). A hierarchical intrusion detection model
based on the PCA neural networks. Neurocomputing, 70, 1561–1568.
• Moradi, M., & Zulkernine, M. (2004). A neural network based system for
intrusion detection and classification of attacks. In Paper presented at the
proceeding of the 2004 IEEE international conference on advances in
intelligent systems – Theory and applications. Luxembourg.
• Zhang, C., Jiang, J., & Kamel, M. (2005). Intrusion detection using
hierarchical neural network. Pattern Recognition Letters, 26, 779–791.
Single Classifiers
Self-Organizing Maps (SOM)
Used to reduce the dimension of data for visualization.
SOM projects and clusters high dimensional input vectors
into a low dimensional (usually 2) visualization map.
Consists of an Input layer and a Kohonen layer.
The Kohonen layer is a two dimensional arrangement of
neurons that maps the n-dimensional input to two
dimensions. SOM maps similar input vectors onto the
same or similar output units on the two dimensional map.
Outputs self-organize to an ordered map and output units
with similar weights are placed nearby after training.
Hierarchical SOM architecture (a) Architecture (b) Data partitioning
Generate Next
Generation
Stein, G., Chen, B., Wu, A. S., & Hua, K. A. (2005). Decision
tree classifier for network intrusion detection with GA-based
feature selection. In Paper presented at the proceedings of
the 43rd annual Southeast regional conference. Kennesaw,
Georgia.
Single Classifiers
Naïve Bayes Networks (NBN)
Provides an answer to questions like “What is
the probability that it is a certain type of attack,
given some observed system events”, by using a
conditional probability formula. Usually
represented by a directed acyclic graph (DAG),
where each node represents one of the system
variables and each link encodes the influence of
one node upon another.
Chavan, S., Shah, K. D. N., & Mukherjee, S. (2004). Adaptive neuro-fuzzy intrusion
detection systems. In Paper presented at the in proceedings of the international
conference on information technology: Coding and computing (ITCC’04).
Florez, G., Bridges, S. M., & Vaughn, R. B. (2002). An improved algorithm for fuzzy data
mining for intrusion detection. In Paper presented at the proceedings of the North
American fuzzy information processing society conference (NAFIPS 2002). New Orleans,
LA.
Correct Incorrect
Teacher (Training Needed)
(No Training)
Winner
(Decision)
w1 w2 w3 wn
Intrusion
Detection
Data
Decision Trees
Multivariate Regression
Splines