Minining intrusion detection alarms with an SA-based clustering approach

Wang Jianxin*, Xia Yunqing, Hongzhou Wang

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

3 Citations (Scopus)

Abstract

Intrusion detection systems generally overload their human operators by triggering per day thousands of alarms most of which are false positives. A clustering method able to eliminate most false positives was put forward by Klaus Julisch, who proved that the clustering problem is NP-complete and proposed a low-quality approximation algorithm. In this paper, the simulated annealing technique is applied in the clustering procedure, to produce high-quality solutions. The local optimization strategy, cooling schedule, and evaluation function are discussed in details. A state-of-the-art selection table is proposed, which greatly reduces the evaluation operation. In order to validate the newly proposed algorithm, a kind of exhaustive searching is implemented, which can find global minima for comparison with the cost of long yet feasible execution time. The results show that the SA-based clustering algorithm can produce solutions with the quality very close to that of the best one, whilst the time consumption is within a reasonable range.

Original languageEnglish
Title of host publicationICCCAS 2007 - International Conference on Communications, Circuits and Systems 2007
Pages905-909
Number of pages5
Publication statusPublished - 2008
EventICCCAS 2007 - International Conference on Communications, Circuits and Systems 2007 - Kokura, Japan
Duration: 11 Jul 200713 Jul 2007

Publication series

NameICCCAS 2007 - International Conference on Communications, Circuits and Systems 2007

Conference

ConferenceICCCAS 2007 - International Conference on Communications, Circuits and Systems 2007
Country/TerritoryJapan
CityKokura
Period11/07/0713/07/07

Fingerprint

Dive into the research topics of 'Minining intrusion detection alarms with an SA-based clustering approach'. Together they form a unique fingerprint.

Cite this