DISTRIBUTED INTRUSION DETECTION SYSTEM USING COOPERATIVE AGENT BASED ON ANT COLONY CLUSTERING

The development of intrusion detection systems (IDS) deals with computational and architectural issues. Cluster-based detection uses its knowledge base in the form of a cluster center. The detection performance against existing attacks as well as new types of attacks is still not as good as the perf...

Full description

Saved in:
Bibliographic Details
Main Author: Nur Kholish AR, Muhammad
Format: Dissertations
Language:Indonesia
Online Access:https://digilib.itb.ac.id/gdl/view/29301
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Institut Teknologi Bandung
Language: Indonesia
id id-itb.:29301
institution Institut Teknologi Bandung
building Institut Teknologi Bandung Library
continent Asia
country Indonesia
Indonesia
content_provider Institut Teknologi Bandung
collection Digital ITB
language Indonesia
description The development of intrusion detection systems (IDS) deals with computational and architectural issues. Cluster-based detection uses its knowledge base in the form of a cluster center. The detection performance against existing attacks as well as new types of attacks is still not as good as the performance of classification-based detection such as artificial neural networks (ANN). Hierarchical clustering requires large computing resources, as well as highdimensional data on IDS development. Partitioned Kmeans capable of processing large data but requires initial cluster initiation. <br /> <br /> <br /> <br /> Ant colony clustering (ACC) is inspired by the behavior of brood care and cemetery organization in the colonies, hierarchical-partitional does not require the initiation of number of clusters, such as the Lumer-Faieta (LF) ACC model. A number of developed ants are able to constantly explore 2D (toroid) search space without supervision, do simple work, collect similar objects to find clusters. The cluster center serves as a knowledge base for detecting attacks such as DoS (denial of service). ACC still faces constraints such as detection rates and false alarm levels that are not yet ideal, large data traffic generates computational loads. <br /> <br /> <br /> <br /> In terms of architecture, distributed and coordinated attack issues such as DDoS (distributed DoS) in botnet environments are still difficult to solve because they require large amounts of information to be disseminated, intercomponent detection collaboration for difficult information synchronization, network traffic loads due to large distributed information, and the use of centralized hierarchical architecture allows the attacker to bypass the communication path and command to the central component. <br /> <br /> <br /> <br /> High-dimensional data constraints are addressed through the extraction and selection based on PCA (principal component analysis) for dimensional reduction in NSL-KDD (DoS attacks) and botnet CTU13-ISCX attack data (DDoS attacks). Numerical features of 32 features (NSL-KDD) are transformed into new features in smaller dimensions with 65.63% reduction (11 new features). CTU13-ISCX with 71 numerical features were transformed into 11 new features (84.51% <br /> <br /> <br /> <br /> <br /> <br /> <br /> <br /> reduction). A subset with 11 features is used in the development of ACC for detection purposes. <br /> <br /> <br /> <br /> ACC model LF-DBSCAN is used to determine the cluster center as a knowledge detection base. Experiment 10 times on the 100x100 grid, with 1,198 (NSL-KDD) and 1,445 (CTU13-ISCX) object resumed cluster extraction using DBSCAN resulting in an attack cluster center (DoS / DDoS) and normal activity. The use of Subset with 11 new features has a rand index cluster index, jaccard coefficient, and maximum fowlkes-mallow indices, as well as the minimum davies-bouldin index. <br /> <br /> <br /> <br /> ACC performance is not reduced in detecting new types of DoS attacks. Values such as TPR, TNR, ACU, PRE, REC, and FM show no significant difference between three different attack scenarios. These are simple scenario attacks uses one type of attack on a single protocol, general attacks with some types of attacks on some protocols, and a common attack that there is a new type of DoS attack and is not included during the cluster center extraction process. ACC performance on DoS detection exceeds Kmeans clustering on a combination of three attack scenarios, by the ROC curve that is closer to the ideal shape and area under the curve. There is a significant difference in DDoS detection performance between the LF-DBSCAN and Kmeans, by the higher TPR, TNR, ACU, PRE, REC, and FM than Kmeans, while the FPR and FNR values are lower than Kmeans. This ROC curve is more close to the ideal shape and area under the curve is wider than Kmeans. <br /> <br /> <br /> <br /> ACC-based IDSs are able to work together without the presence of centralized components in building a shared cluster center as a knowledge base of DoS/DDoS attack detection using randomized gossip. Ten learning agents cooperate each others and demonstrate the convergence of feature values toward a new cluster center as a shared knowledge base for detection. Randomized gossip supports the development of an ACC-based distributed IDS architecture with the absence of centralized, non-hierarchical components to close vulnerability loopholes. Cluster centers from randomized gossip can be used for attack detection and can increase TPR, TNR, ACU, PRE, and FM on DoS detection by up to 57% and DDoS by 25%, and decrease FPR and FNR on DoS detection by 73% and DDoS up to 41%, compared with no randomized gossip and Kmeans clustering. <br /> <br /> <br /> <br /> This study proposes the development of an ACC-based distributed IDS architecture through the collaboration of several agents to recognize the types of DoS attacks and DDoS attacks on the botnet network.
format Dissertations
author Nur Kholish AR, Muhammad
spellingShingle Nur Kholish AR, Muhammad
DISTRIBUTED INTRUSION DETECTION SYSTEM USING COOPERATIVE AGENT BASED ON ANT COLONY CLUSTERING
author_facet Nur Kholish AR, Muhammad
author_sort Nur Kholish AR, Muhammad
title DISTRIBUTED INTRUSION DETECTION SYSTEM USING COOPERATIVE AGENT BASED ON ANT COLONY CLUSTERING
title_short DISTRIBUTED INTRUSION DETECTION SYSTEM USING COOPERATIVE AGENT BASED ON ANT COLONY CLUSTERING
title_full DISTRIBUTED INTRUSION DETECTION SYSTEM USING COOPERATIVE AGENT BASED ON ANT COLONY CLUSTERING
title_fullStr DISTRIBUTED INTRUSION DETECTION SYSTEM USING COOPERATIVE AGENT BASED ON ANT COLONY CLUSTERING
title_full_unstemmed DISTRIBUTED INTRUSION DETECTION SYSTEM USING COOPERATIVE AGENT BASED ON ANT COLONY CLUSTERING
title_sort distributed intrusion detection system using cooperative agent based on ant colony clustering
url https://digilib.itb.ac.id/gdl/view/29301
_version_ 1822922874526105600
spelling id-itb.:293012018-10-02T15:34:51ZDISTRIBUTED INTRUSION DETECTION SYSTEM USING COOPERATIVE AGENT BASED ON ANT COLONY CLUSTERING Nur Kholish AR, Muhammad Indonesia Dissertations INSTITUT TEKNOLOGI BANDUNG https://digilib.itb.ac.id/gdl/view/29301 The development of intrusion detection systems (IDS) deals with computational and architectural issues. Cluster-based detection uses its knowledge base in the form of a cluster center. The detection performance against existing attacks as well as new types of attacks is still not as good as the performance of classification-based detection such as artificial neural networks (ANN). Hierarchical clustering requires large computing resources, as well as highdimensional data on IDS development. Partitioned Kmeans capable of processing large data but requires initial cluster initiation. <br /> <br /> <br /> <br /> Ant colony clustering (ACC) is inspired by the behavior of brood care and cemetery organization in the colonies, hierarchical-partitional does not require the initiation of number of clusters, such as the Lumer-Faieta (LF) ACC model. A number of developed ants are able to constantly explore 2D (toroid) search space without supervision, do simple work, collect similar objects to find clusters. The cluster center serves as a knowledge base for detecting attacks such as DoS (denial of service). ACC still faces constraints such as detection rates and false alarm levels that are not yet ideal, large data traffic generates computational loads. <br /> <br /> <br /> <br /> In terms of architecture, distributed and coordinated attack issues such as DDoS (distributed DoS) in botnet environments are still difficult to solve because they require large amounts of information to be disseminated, intercomponent detection collaboration for difficult information synchronization, network traffic loads due to large distributed information, and the use of centralized hierarchical architecture allows the attacker to bypass the communication path and command to the central component. <br /> <br /> <br /> <br /> High-dimensional data constraints are addressed through the extraction and selection based on PCA (principal component analysis) for dimensional reduction in NSL-KDD (DoS attacks) and botnet CTU13-ISCX attack data (DDoS attacks). Numerical features of 32 features (NSL-KDD) are transformed into new features in smaller dimensions with 65.63% reduction (11 new features). CTU13-ISCX with 71 numerical features were transformed into 11 new features (84.51% <br /> <br /> <br /> <br /> <br /> <br /> <br /> <br /> reduction). A subset with 11 features is used in the development of ACC for detection purposes. <br /> <br /> <br /> <br /> ACC model LF-DBSCAN is used to determine the cluster center as a knowledge detection base. Experiment 10 times on the 100x100 grid, with 1,198 (NSL-KDD) and 1,445 (CTU13-ISCX) object resumed cluster extraction using DBSCAN resulting in an attack cluster center (DoS / DDoS) and normal activity. The use of Subset with 11 new features has a rand index cluster index, jaccard coefficient, and maximum fowlkes-mallow indices, as well as the minimum davies-bouldin index. <br /> <br /> <br /> <br /> ACC performance is not reduced in detecting new types of DoS attacks. Values such as TPR, TNR, ACU, PRE, REC, and FM show no significant difference between three different attack scenarios. These are simple scenario attacks uses one type of attack on a single protocol, general attacks with some types of attacks on some protocols, and a common attack that there is a new type of DoS attack and is not included during the cluster center extraction process. ACC performance on DoS detection exceeds Kmeans clustering on a combination of three attack scenarios, by the ROC curve that is closer to the ideal shape and area under the curve. There is a significant difference in DDoS detection performance between the LF-DBSCAN and Kmeans, by the higher TPR, TNR, ACU, PRE, REC, and FM than Kmeans, while the FPR and FNR values are lower than Kmeans. This ROC curve is more close to the ideal shape and area under the curve is wider than Kmeans. <br /> <br /> <br /> <br /> ACC-based IDSs are able to work together without the presence of centralized components in building a shared cluster center as a knowledge base of DoS/DDoS attack detection using randomized gossip. Ten learning agents cooperate each others and demonstrate the convergence of feature values toward a new cluster center as a shared knowledge base for detection. Randomized gossip supports the development of an ACC-based distributed IDS architecture with the absence of centralized, non-hierarchical components to close vulnerability loopholes. Cluster centers from randomized gossip can be used for attack detection and can increase TPR, TNR, ACU, PRE, and FM on DoS detection by up to 57% and DDoS by 25%, and decrease FPR and FNR on DoS detection by 73% and DDoS up to 41%, compared with no randomized gossip and Kmeans clustering. <br /> <br /> <br /> <br /> This study proposes the development of an ACC-based distributed IDS architecture through the collaboration of several agents to recognize the types of DoS attacks and DDoS attacks on the botnet network. text