The Application of Fuzzy Clustering Number Algorithm in Network Intrusion Detection

Article Preview

Abstract:

In view of the defects of K-means algorithm in intrusion detection: the need of preassign cluster number and sensitive initial center and easy to fall into local optimum, this paper puts forward a fuzzy clustering algorithm. The fuzzy rules are utilized to express the invasion features, and standardized matrix is adopted to further process so as to reflect the approximation degree or correlation degree between the invasion indicator data and establish a similarity matrix. The simulation results of KDD CUP1999 data set show that the algorithm has better intrusion detection effect and can effectively detect the network intrusion data.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 760-762)

Pages:

2220-2223

Citation:

Online since:

September 2013

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Fu De-sheng, Zhou Shu, Guo Ping. Design and Implementation of Distributed Network Intrusion Detection System Based on Data Mining[J]. Computer Science, 2009, 36(3): 103-105.

Google Scholar

[2] XU R, DONALD W. Survey of clustering algorithms[J]. IEEE Transactions on Neural Networks, 2005, 16(3): 645-678.

Google Scholar

[3] Price K V, Storn R M, Lampinen J A. Differential evolution: A practical approach to global optimization[M]. Berlin Heidelberg: Springer, (2005).

Google Scholar

[4] Mukkamala S, Janoski G, Sung A H. Intrusion Detection Using Support Vector Machines and Neural Networks[C]/Proc. of IEEE International Joint Conference on Neural Networks. Washington D.C., USA: [s. n. ], 2002: 1702-1707.

DOI: 10.1109/ijcnn.2002.1007774

Google Scholar

[5] Portnoy L, Eskin E, Stolfo S J. Intrusion Detection with Unlabeled Data Using Clustering[C]/Proc. of ACM CSS Workshop on Data Mining Applied to Security. Philadelphia, PA, 2001: 123-130.

Google Scholar

[6] Eskin E, Arnold A, Prerau M, etal. A geometric framework for unsupervised anomaly detection: Detecting intrustions in unlabeled data[J]. Data Mining for Security Applications, 2002, 17(5): 873-891.

DOI: 10.1007/978-1-4615-0953-0_4

Google Scholar

[7] ELKAN C. Results of the KDD'99 classifier learning[J]. ACM SIGKDD Explorations Newsletter, 2000, 1(2): 63-64.

DOI: 10.1145/846183.846199

Google Scholar