A Hybrid FCM Clustering- Neural Network Model for Intrusion Detection

Article Preview

Abstract:

Security has become an important issue for networks. Intrusion detection technology is an effective approach in dealing with the problems of network security. In this paper, we present an intrusion detection model based on hybrid fuzzy logic and neural network. The key idea is to take advantage of different classification abilities of fuzzy clustering and neural network for intrusion detection system. The new model has ability to recognize an attack, to differentiate one attack from another (i.e. classifying attacks), and the most important, to detect new attacks with high detection rate and low false negative. Training and testing data were obtained from the Defense Advanced Research Projects Agency intrusion detection evaluation data set.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 403-408)

Pages:

3519-3527

Citation:

Online since:

November 2011

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2012 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] M. Jawhar, and Mehrotra M., Intrusion Detection System: A design perspective, 2rd International Conference on Data Management, IMT Ghaziabad, (2009).

Google Scholar

[2] M. Panda, and Patra M., Building an efficient network intrusion detection model using Self Organizing Maps, proceeding of world academy of science, engineering and technology, Vol. 38 Feb. (2009).

Google Scholar

[3] M. Khattab Ali, Venus W, and Mamoun Suleiman Al Rababaa, The Affect of Fuzzification on Neural Networks Intrusion Detection System, IEEE, (2009).

DOI: 10.1109/iciea.2009.5138399

Google Scholar

[4] B. Mykerjee, Heberlein L.T., and Levitt K.N., Network Intrusion Detection, IEEE Networks, Vol. 8, No. 3, 1994. PP. 14-26.

Google Scholar

[5] W. Jung K., Integration Artificial Immune Algorithms for Intrusion Detection, dissertation in University of London, 2002, PP. 1-5.

Google Scholar

[6] M. Al-Subaie, The power of sequential learning in anomaly intrusion detection, degree master thesis, Queen University, Canada, (2006).

Google Scholar

[7] P. Kukielka, and Kotulski, Z., Analysis of different architectures of neural networks for application in intrusion detection systems, proceeding of the international multiconference on computer science and information technology, 2008, pp.807-811.

DOI: 10.1109/imcsit.2008.4747335

Google Scholar

[8] M. Moradi, and Zulkernine M., A Neural Network based system for intrusion detection and classification of attacks, Queen University, Canada, (2004).

Google Scholar

[9] D. Novikov, Roman V. Yampolskiy, and Leon Reznik, Artificial Intelligence Approaches For Intrusion Detection, IEEE, (2006).

DOI: 10.1109/lisat.2006.4302651

Google Scholar

[10] L. de Sá Silva, Adriana C. Ferrari dos Santos, José Demisio S. da Silva, and Antonio Montes, A Neural Network Application for Attack Detection in Computer Networks, Instituto Nacional de Pesquisas Espaciais – INPE, BRAZIL, (2004).

DOI: 10.1109/ijcnn.2004.1380190

Google Scholar

[11] Z. TIE-JUN and LI Yang, The Research of Intrusion Detection Based on Genetic Neural Network, Proceedings of the 2008 International Conference on Wavelet Analysis and Pattern Recognition, Hong Kong, IEEE, 30-31 Aug, (2008).

DOI: 10.1109/icwapr.2008.4635789

Google Scholar

[12] J. Shum and Heidar A. Malki, Network Intrusion Detection System Using Neural Networks, Fourth International Conference on Natural Computation, IEEE, (2008).

DOI: 10.1109/icnc.2008.900

Google Scholar

[13] D. Novikov, Roman V. Yampolskiy, and Leon Reznik, Anomaly Detection Based Intrusion Detection, Proceedings of the Third International Conference on Information Technology: New Generations, IEEE, (2006).

DOI: 10.1109/itng.2006.33

Google Scholar

[14] I. Ahmad, Sami Ullah Swati and Sajjad Mohsin, Intrusions Detection Mechanism by Resilient Back Propagation (RPROP), European Journal of Scientific Research ISSN 1450-216X Vol. 17 No. 4, pp.523-531, (2007).

Google Scholar

[15] Srinivas Mukkamala, Andrew H. Sung, and Ajith Abraham, Intrusion detection using an ensemble of intelligent paradigms, Journal of Network and Computer Applications 28. 2005, p.167–182.

DOI: 10.1016/j.jnca.2004.01.003

Google Scholar

[16] S. Jimmy and Heidar A., Network Intrusion Detection System using Neural Networks, IEEE computer society, (2008).

Google Scholar

[17] M. Vallipuram, and Robert B., An Intelligent Intrusion Detection System based on Neural Network, IADIS International Conference Applied Computing, (2004).

Google Scholar

[18] J. Bezdek, C., pattern Recognition with Fuzzy Objective Function Algorithms,. Plenum, NewYork, (1981).

Google Scholar

[19] Y. John, and Langari, R., Fuzzy Logic intelligence, control, and information, Publish by Dorling Kindersley, India, (2006).

Google Scholar

[20] P. Kukiełka and Zbigniew Kotulski, Analysis of Different Architectures of Neural Networks for Application in Intrusion Detection Systems, Proceedings of the International Multiconference on Computer Science and Information Technology, IEEE, 2008, p.807.

DOI: 10.1109/imcsit.2008.4747335

Google Scholar

[21] KDD-cup-dataset. http: /kdd. ics. uci. edu/database/ kddcupaa/kddcup. html.

Google Scholar

[22] Loril D., Applying Soft Computing Techniques to intrusion Detection, Ph. D thesis, Dep. Of Computer Sce. University of Colorado at Colorado Spring, (2005).

Google Scholar