Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1109/SAINT.2012.51guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Unknown Attacks Detection Using Feature Extraction from Anomaly-Based IDS Alerts

Published: 16 July 2012 Publication History

Abstract

Intrusion Detection Systems (IDSs) play an important role detecting various kinds of attacks and defend our computer systems from them. There are basically two main types of detection techniques: signature-based and anomaly-based. A signature-based IDS cannot detect unknown attacks because a signature has not been written. To overcome this shortcoming, many researchers have been developing anomaly-based IDSs. Although they can detect unknown attacks, there is a problem that they just classify network traffic into normal or abnormal. Therefore, IDS operators have to manually inspect IDS alerts to classify them into known attacks or unknown attacks. Because there are a lot of alerts related to known attacks, it is difficult to extract only unknown attacks from them. In this paper, we present a method that automatically detects unknown attacks from an anomaly-based IDS alerts. We evaluate our method using Kyoto2006+ dataset.

Cited By

View all
  • (2024)A voting gray wolf optimizer-based ensemble learning models for intrusion detection in the Internet of ThingsInternational Journal of Information Security10.1007/s10207-023-00803-x23:3(1557-1581)Online publication date: 1-Jun-2024
  1. Unknown Attacks Detection Using Feature Extraction from Anomaly-Based IDS Alerts

      Recommendations

      Comments

      Please enable JavaScript to view thecomments powered by Disqus.

      Information & Contributors

      Information

      Published In

      cover image Guide Proceedings
      SAINT '12: Proceedings of the 2012 IEEE/IPSJ 12th International Symposium on Applications and the Internet
      July 2012
      429 pages
      ISBN:9780769547374

      Publisher

      IEEE Computer Society

      United States

      Publication History

      Published: 16 July 2012

      Author Tags

      1. anomaly detection
      2. intrusion detection system
      3. unknown attacks

      Qualifiers

      • Article

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)0
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 23 Nov 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (2024)A voting gray wolf optimizer-based ensemble learning models for intrusion detection in the Internet of ThingsInternational Journal of Information Security10.1007/s10207-023-00803-x23:3(1557-1581)Online publication date: 1-Jun-2024

      View Options

      View options

      Login options

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media