Anomaly intrusion behavior detection based on fuzzy clustering and features selection

被引:0
作者
Tang, Chenghua [1 ,2 ]
Liu, Pengcheng [1 ,2 ]
Tang, Shensheng [3 ]
Xie, Yi [4 ]
机构
[1] Guangxi Key Laboratory of Trusted Software, Guilin University of Electronic Technology, Guilin, 541004, Guangxi
[2] Guangxi Experiment Center of Information Science, Guilin University of Electronic Technology, Guilin, 541004, Guangxi
[3] Department of Engineering Technology, Missouri Western State University, Saint Joseph, Missouri
[4] School of Information Science and Technology, Sun Yat-sen University, Guangzhou
来源
Jisuanji Yanjiu yu Fazhan/Computer Research and Development | 2015年 / 52卷 / 03期
关键词
Anomaly detection; Features selection; Fuzzy C-means; Fuzzy clustering; Hierarchical clustering;
D O I
10.7544/issn1000-1239.2015.20130601
中图分类号
学科分类号
摘要
The behaviors of network attack connection are always changeable and complex. Typical behavior mining methods, which always do using traditional clustering, do not fit in with constructing anomaly intrusion detection model. According to the characteristics of network attacks, the anomaly intrusion detection model based on fuzzy clustering and features selection are proposed. Firstly, the results that the fuzzy C-means clustering algorithm is sensitive to the initial cluster centers is improved using hierarchical clustering algorithm, the disadvantage that FCM is easy to fall into local optimum in the iteration is overcome using the global search ability of genetic algorithm, and they are combined into a AGFCM algorithm. Secondly, the feature attribute data sets of network attack connection are sorted through the information gain algorithm. The capacity of feature attributes is determined by using the Youden index to cut the data sets at the same time. Lastly, the anomaly intrusion detection model is built by using the attribute data sets dimensionality reduction and improved FCM clustering algorithm. Experimental results show that the anomaly intrusion detection model can effectively detect the vast majority of network attack types, which provides a feasible solution for solving the problems of false alarm rate and detection rate in anomaly intrusion detection model. ©, 2015, Jisuanji Yanjiu yu Fazhan/Computer Research and Development. All right reserved.
引用
收藏
页码:718 / 728
页数:10
相关论文
共 27 条
[1]  
Lee W., Stolfo S.J., Data mining approaches for intrusion detection, Proc of the 7th USENIX Security Symposium, pp. 79-93, (1998)
[2]  
Li C., Tian X., Xiao X., Et al., Anomaly detection of user behavior based on shell commands and co-occurrence matrix, Journal of Computer Research and Development, 49, 9, pp. 1982-1990, (2012)
[3]  
Denatious D.K., John A., Survey on data mining techniques to enhance intrusion detection, Proc of the 2012 Int Conf on Computer Communication and Informatics, pp. 1-5, (2012)
[4]  
Chitrakar R., Huang C., Anomaly detection using support vector machine classification with K-medoids clustering, Proc of the 3rd Asian Himalayas Int Conf on Internet, pp. 1-5, (2012)
[5]  
Srinoy S., Kurutach W., Chimphlee W., Et al., Intrusion detection via independent component analysis based on rough fuzzy, WSEAS Trans on Computers, 5, 1, pp. 43-48, (2006)
[6]  
Rose K., Gurewitz E., Fox G.C., Constrained clustering as optimization method, IEEE Trans on Pattern Analysis and Machine Intelligence, 15, 8, pp. 785-794, (1993)
[7]  
Zhang X., Fuzzy C-means clustering algorithm with two stages, Journal of Circuits and System, 10, 2, pp. 117-121, (2005)
[8]  
Berget I., Mevik B.H., New modifications and applications of fuzzy C-means methodology, Computational Statistics and Data Analysis, 52, 5, pp. 2403-2418, (2008)
[9]  
Wang Z., Liu Z., Chen D., Research of PSO-based fuzzy C-means clustering algorithm, Computer Science, 39, 9, pp. 166-169, (2012)
[10]  
Chen Y., Cheng X., Li Y., Et al., Lightweight intrusion detection system based on feature selection, Journal of Software, 18, 7, pp. 1639-1651, (2007)