A Lightweight Method for Detecting Cyber Attacks in High-traffic Large Networks based on Clustering Techniques
-
Published:2023-01-30
Issue:01
Volume:15
Page:35-51
-
ISSN:0975-2293
-
Container-title:International journal of Computer Networks & Communications
-
language:
-
Short-container-title:IJCNC
Author:
Son Nguyen Hong,Dung Ha Thanh
Abstract
Protecting information systems is a difficult and long-term task. The size and traffic intensity of computer networks are diverse and no one protection solution is universal for all cases. A certain solution protects well in the campus network, but it is unlikely to protect well in the service provider's network. A key component of a cyber defence system is a network attack detector. This component needs to be designed to have a good way to scale detection capabilities with network size and traffic intensity beyond the size and intensity of a campus network. From this point of view, this paper aims to build a network attack detection method suitable for the scale of large and high-traffic networks based on machine learning models using clustering techniques and our proposed detection technique. The detection technique is different from outlier detection commonly used in clustering-based anomaly detection applications. The method was evaluated in cases using different feature extraction methods and different clustering algorithms. Experimental results on the NSL-KDD data set are positive with a detection accuracy of over 97%.
Publisher
Academy and Industry Research Collaboration Center (AIRCC)
Subject
Computer Networks and Communications,Hardware and Architecture
Reference91 articles.
1. [1] Guan Xin and Li Yun-jie,(2010) "A new Intrusion PreventionAttack System Model based on
2. Immune Principle",International Conference on e-Business and InformationSystem Security (EBISS),
3. in IEEE, pp. 1-4.
4. [2] A. H. Almutairi and N. T. Abdelmajeed, (2017) "Innovative signature based intrusion detection
5. system: Parallel processing and minimized database", International Conference on the Frontiers and