Intrusion Detection Method Based on LEGClust Algorithm

Article Preview

Abstract:

Clustering analysis is a typical unsupervised learning technology in data mining, which can improve the efficiency of intrusion detection system. LEGClust cluster algorithm is a new clustering analysis technique and it can effectively find the arbitrary shape clusters hidden in the data. We apply this algorithm to the intrusion detection field and present an intrusion detection method. We introduce the real dissimilarity among data into the determination of data connection relationship. Experiment results on KDD CUP1999 Dataset show that LEGClust algorithm is an effective technique for intrusion detection and the improved LEGClust performs even better.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

3025-3033

Citation:

Online since:

December 2012

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Giles. L, Stolfo. S. J and Mok. K.W: Proc. of IEEE Symposium on Security and Privacy. [S.l.]: IEEE Press, (1999), pp.120-132.

Google Scholar

[2] Yifeng. Lian, Yingxia. Dai and Hang. Wang: Chinese Journal of Computers, (2002), Vol.25, p.325. (in Chinese)

Google Scholar

[3] Xiaohui. Chen: Computer Engineering, Vol.36 (2010), p.72.(in Chinese)

Google Scholar

[4] Ganger. G. R and Nagel. D.F: Hot Topics in operating Systems[C]. [s.1.]: IEEE,(2001), p.100

Google Scholar

[5] Santos. J.M, Marques. J and Alexandre. L. A: IEEE Transactions on Pattern Analysis and Machine Intelligence, vol.30, (2000), p.62.

Google Scholar

[6] KDD CUP Dataset[EB/OL]. (2010-02-17). http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html

Google Scholar

[7] Parzen E: Annals of Mathematical Statistics, vol.33, (1962), p.1065

Google Scholar

[8] Renyi. A: Proc. of the 4th Berkeley Symposium on Mathematical Statistics and Probability, (2001), p.547.

Google Scholar

[9] Ester M, Kriegel. H, Sander J, et al: Proc. of the 2nd International Conference on Knowledge Discovery and Data Mining, (2001), p.226.

Google Scholar

[10] Shi. Jianbo, Malik. J: IEEE Transaction on Pattern Analysis and Machine Intelligence, vol.22, (2000), p.888

Google Scholar