Combining conjunctive rule extraction with diffusion maps for network intrusion detection
Abstract
Network security and intrusion detection are important
in the modern world where communication happens
via information networks. Traditional signature-based intrusion
detection methods cannot find previously unknown attacks. On
the other hand, algorithms used for anomaly detection often
have black box qualities that are difficult to understand for
people who are not algorithm experts. Rule extraction methods
create interpretable rule sets that act as classifiers. They have
mostly been combined with already labeled data sets. This
paper aims to combine unsupervised anomaly detection with
rule extraction techniques to create an online anomaly detection
framework. Unsupervised anomaly detection uses diffusion maps
and clustering for labeling an unknown data set. Rule sets are
created using conjunctive rule extraction algorithm. This research
suggests that the combination of machine learning methods and
rule extraction is a feasible way to implement network intrusion
detection that is meaningful to network administrators.
Main Authors
Format
Conferences
Conference paper
Published
2013
Series
Subjects
Publication in research information system
Publisher
IEEE
The permanent address of the publication
https://urn.fi/URN:NBN:fi:jyu-201404031456Use this for linking
Parent publication ISBN
978-1-4799-3755-4
Review status
Peer reviewed
ISSN
1530-1346
DOI
https://doi.org/10.1109/ISCC.2013.6754981
Conference
International Symposium on Computers and Communications
Language
English
Published in
International Symposium on Computers and Communications
Is part of publication
The Eighteenth IEEE Symposium on Computers and Communications
Citation
- Juvonen, A., & Sipola, T. (2013). Combining conjunctive rule extraction with diffusion maps for network intrusion detection. In The Eighteenth IEEE Symposium on Computers and Communications (pp. 411-416). IEEE. International Symposium on Computers and Communications. https://doi.org/10.1109/ISCC.2013.6754981
Copyright© 2013 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses. This is the authors’ postprint version of the article. The original print version
appeared as: A. Juvonen and T. Sipola, “Combining conjunctive rule extraction
with diffusion maps for network intrusion detection,” in In The Eighteenth
IEEE Symposium on Computers and Communications (ISCC 2013). IEEE
2013.