Advertisement

A Self-training Approach for Automatically Labeling IP Traffic Traces

  • Francesco Gargiulo
  • Claudio Mazzariello
  • Carlo Sansone
Part of the Advances in Soft Computing book series (AINSC, volume 45)

Abstract

Many approaches have been proposed so far to tackle computer network security. Among them, several systems exploit Pattern Recognition techniques, by regarding malicious behavior detection as a classification problem.

Keywords

Intrusion Detection Confusion Matrix Intrusion Detection System Basic Probability Assignment Pattern Recognition Letter 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    C.-C. Chang, C.-J. Lin, LIBSVM: A Library for Support Vector Machines, 2001.Google Scholar
  2. 2.
    W.W. Cohen, Y. Singer. Simple, Fast, and Effective Rule Learner. In Proceedings of the 16th National Conf. on Artificial Intelligence and 11th Conf. on Innovative Applications of Artificial Intelligence, Orlando (FL), USA, pp. 335–342, July 18–22, 1999.Google Scholar
  3. 3.
    C. Elkan, Results of the KDD99 classifier learning, ACM SIGKDD Explorations 1, pp. 63–64, 2000.CrossRefGoogle Scholar
  4. 4.
    M. Esposito, C. Mazzariello, F. Oliviero, S. P. Romano, C. Sansone, Real Time Detection of Novel Attack by Means of Data Mining Techniques. In: C.-S. Chen, J. Filipe, I. Seruca, J. Cordeiro (Eds.), Enterprise Information Systems VII, Springer-Verlag, pp. 197–204, 2006.Google Scholar
  5. 5.
    T. Fawcett, An introduction to ROC analysis, Pattern Recognition Letters vol. 27, pp. 861–874, 2006.CrossRefGoogle Scholar
  6. 6.
    F. Gargiulo, C. Mazzariello, C. Sansone, Information Fusion techniques for reliably Training Intrusion Detection System. In Proc. of IWAPR 2007, Springer Verlag, 2007 (in press).Google Scholar
  7. 7.
    G. Giacinto, F. Roli, L. Didaci, Fusion of multiple classifiers for intrusion detection in computer networks, Pattern Recognition Letters, vol. 24, pp. 1795–1803, 2003.CrossRefGoogle Scholar
  8. 8.
    J. Gordon, E.H. Shortliffe, The Dempster-Shafer Theory of Evidence, in B.G. Buchanan and E.H. Shortliffe (Eds.), Rule-Based Expert Systems, Addison-Wesley, pp. 272–292, 1984.Google Scholar
  9. 9.
    L.I. Kuncheva, Switching Between Selection and Fusion in Combining Classifiers: An Experiment. In IEEE Transactions on Systems, Man, and Cybernetics-Part B: Cybernetics, vol. 32, no. 2, 2002.Google Scholar
  10. 10.
    L.I. Kuncheva, J.C. Bezdek, R.P.W. Duin, Decision templates for multiple classifier fusion: an experimental comparison. In Pattern Recognition, vol. 34, pp. 299–314. 2001.zbMATHCrossRefGoogle Scholar
  11. 11.
    P. Laskov, P. Daussei, C. Schafer, K. Rieck, Learning intrusion detection: supervised or unsupervised?, in F. Roli and S. Vitulano (Eds.), Lecture Notes in Computer Science, vol. 3617, Springer-Verlag, Berlin, pp. 50–57, 2005.Google Scholar
  12. 12.
    M.V. Mahoney, P.K. Chan, An Analysis of the 1999 DARPA/Lincoln Laboratory Evaluation Data for Network Anomaly Detection, in G. Vigna, E. Jonsson, C. Kruegel (Eds.), LNCS vol. 2820, Proceedings of RAID 2003, pp. 220–238, 2003.Google Scholar
  13. 13.
    L. Xu, A. Krzyzak, C.Y. Suen, Methods of Combining Multiple Classifiers and Their Applications to Handwriting Recognition. IEEE Trans, on SMC., Vol. 22, pp. 418–435, 1992.Google Scholar
  14. 14.
    S. Zanero, Analyzing tcp traffic patterns using self organizing maps, in F. Roli and S. Vitulano (Eds.), Lecture Notes in Computer Science, vol. 3617, Springer-Verlag, Berlin, pp. 8390, 2005.Google Scholar
  15. 15.
    C. Zhang, J. Jiang, M. Kamel, Intrusion detection using hierarchical neural networks. Pattern Recognition Letters 26(6), pp. 779–791, 2005.CrossRefGoogle Scholar
  16. 16.
    X. Zhu, Semi-Supervised Learning Literature Survey, Computer Sciences, University of Wisconsin-Madison 1530, http://www.cs.wisc.edu/~jerryzhu/pub/ssLsurvey.pdf, 2005.Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2007

Authors and Affiliations

  • Francesco Gargiulo
    • 1
  • Claudio Mazzariello
    • 1
  • Carlo Sansone
    • 1
  1. 1.Dipartimento di Informatica e SistemisticaUniversità di Napoli Federico IINapoliItaly

Personalised recommendations