CFP last date
20 May 2024
Reseach Article

Applying Outlier Detection Techniques in Anomaly-based Network Intrusion Systems – A Theoretical Analysis

Published on January 2014 by J. Rene Beulah, D. Shalini Punithavathani
International Seminar on Computer Vision 2013
Foundation of Computer Science USA
ISCV - Number 1
January 2014
Authors: J. Rene Beulah, D. Shalini Punithavathani
d6bedb75-2ed1-4c32-aa05-e7e9fed60901

J. Rene Beulah, D. Shalini Punithavathani . Applying Outlier Detection Techniques in Anomaly-based Network Intrusion Systems – A Theoretical Analysis. International Seminar on Computer Vision 2013. ISCV, 1 (January 2014), 6-9.

@article{
author = { J. Rene Beulah, D. Shalini Punithavathani },
title = { Applying Outlier Detection Techniques in Anomaly-based Network Intrusion Systems – A Theoretical Analysis },
journal = { International Seminar on Computer Vision 2013 },
issue_date = { January 2014 },
volume = { ISCV },
number = { 1 },
month = { January },
year = { 2014 },
issn = 0975-8887,
pages = { 6-9 },
numpages = 4,
url = { /proceedings/iscv/number1/15107-1302/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 International Seminar on Computer Vision 2013
%A J. Rene Beulah
%A D. Shalini Punithavathani
%T Applying Outlier Detection Techniques in Anomaly-based Network Intrusion Systems – A Theoretical Analysis
%J International Seminar on Computer Vision 2013
%@ 0975-8887
%V ISCV
%N 1
%P 6-9
%D 2014
%I International Journal of Computer Applications
Abstract

With the advent of the Internet, security has become a major concern. An intrusion detection system is used to enhance the security of networks by inspecting all inbound and outbound network activities and by identifying suspicious patterns as possible intrusions. For the past two decades, many researchers are working in Intrusion Detection Systems. In recent years, anomaly detection has gained popularity with its ability to detect novel attacks. Nowadays researchers focus on applying outlier detection techniques for anomaly detection because of its promising results in identifying true attacks and in reducing false alarm rate. In this paper, some of the works which applied outlier analysis in anomaly detection is studied and their results are analyzed.

References
  1. Mahbod Tavallaee, Natalia Stakhanova, Ali Akbar Ghorbani, "Toward Credible Evaluation of Anomaly-Based Intrusion-Detection Methods", IEEE Transactions on Systems, Man and Cybernetics - Part C: Applications and Reviews, Vol. 40, No. 5, September 2010.
  2. Bin HUANG, Wen-fang LI, De-li CHEN, Liang SHI, "An Intrusion Detection Method Based on Outlier Ensemble Detection", IEEE International Conference on Networks Security, Wireless Communications and Trusted Computing, 2009.
  3. Manowar H Bhuyan, D K Bhattacharyya, J K Kalita, "NADO: Network Anomaly Detection Using Outlier Approach", ICCCS'11 February 12-14, 2011, Rourkela, Odisha, India Copyright © 2011 ACM 978-1-4503-0464-1/11/02.
  4. A Mira, D K Bhattacharyya, S Saharia, "RODHA: Robust Outlier Detection using Hybrid Approach", American Journal of Intelligent Systems 2012, 2(5): 129-140.
  5. Prasanta Godoi, D K Bhattacharyya, B Borah, Jugal K Kalita, "A Survey of Outlier Detection Methods in Network Anomaly Identification", The Computer Journal, Vol. 54 No. 4, 2011.
  6. Fu Xiao, Xie Li. 2008, "Using Outlier Detection to Reduce False Positives in Intrusion Detection", IEEE IFIP International Conference on Network and Parallel Computing, 2008.
  7. Komsit Prakobphol, Justin Zhan, "A Novel Outlier Detection Scheme for Network Intrusion Detection Systems", IEEE International Conference on Information Security and Assurance, 2008.
  8. Jiong Zhang, Mohammad Zulkernine, Anwar Haque, "Random-Forests-Based Network Intrusion Detection Systems", IEEE Transactions on Systems, Man, Cybernetics - Part C: Applications and Reviews, Vol. 38, No. 5, September 2008.
  9. Peng Yang, Biao Huang, "Density Based Outlier Mining Algorithm with Application to Intrusion Detection", IEEE Pacific-Asia Workshop on Computational Intelligence and Industrial Application, 2008.
  10. S. Ganapathy, N. Jaisankar, P. Yogesh, A. Kannan, "An Intelligent System for Intrusion Detection Using Outlier Detection", IEEE International Conference on Recent Trends in Information Technology, 2011.
  11. Pedro Casas, Johan Mazel, Philippe Owezarski, "UNADA: Unsupervised Network Anomaly Detection Using Sub-space Outliers Ranking
  12. David Kershaw, Qignag Gao, Hai Wang, "Anomaly-Based Network Intrusion Detection Using Outlier Subspace Analysis: A Case Study", Canadian AI 2001, LNAI 6657, pp. 234-239, 2011 © Springer-Verlag Berlin Heidelberg 2011.
Index Terms

Computer Science
Information Sciences

Keywords

Outlier Detection Anomaly Detection Intrusion Detection