To identify suspicious activity in anomaly detection based on soft computing

被引:0
作者
Chimphlee, W [1 ]
Sap, NM
Abdullah, AH
Chimphlee, S
Srinoy, S
机构
[1] Suan Dusit Rajabhat Univ, Fac Sci & Technol, 295 Rajasrima Rd, Bangkok, Thailand
[2] Univ Technol Malaysia, Fac Comp Sci & Informat Syst, Skudai 81310, Johor, Malaysia
来源
PROCEEDINGS OF THE IASTED INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE AND APPLICATIONS | 2006年
关键词
network security; intrusion detection; rough set; fuzzy c-means; anomaly detection; suspicious activity;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The Traditional intrusion detection systems (IDS) look for unusual or suspicious activity, Such as patterns of network traffic that are likely indicators of unauthorized activity. However, normal operation often produces traffic that matches likely "attack signature", resulting in false alarms. In this paper we propose an intrusion detection method that proposes rough set based feature selection heuristics and using fuzzy c-means for clustering data. Rough set has to decrease the amount of data and get rid of redundancy. Fuzzy Clustering methods allow objects to belong to several clusters simultaneously, with different degrees of membership. Our approach allows us to recognize not only known attacks but also to increase accuracy detection rate for Suspicious activity and signature detection. Empirical studies using the network security data set from the DARTA 1998 offline intrusion detection project (KDD 1999 Cup) show the feasibility of misuse and anomaly detection results.
引用
收藏
页码:359 / +
页数:3
相关论文
共 7 条
[1]  
[Anonymous], IEEE S SEC PRIV
[2]  
Bace R., 2001, Intrusion Detection Systems
[3]  
Bauer D. S., 1988, Proceedings of the Computer Networking Symposium (Cat. No.88CH2547-8), P98, DOI 10.1109/CNS.1988.4983
[4]  
DAGUPTA D, 2002, IEEE T EVOLUTIONARY, V6, P28
[5]  
LANE T, 2000, THESIS PURD U
[6]  
Lee W, 1998, PROCEEDINGS OF THE SEVENTH USENIX SECURITY SYMPOSIUM, P79
[7]  
SUNDARAM A, 1996, CROSSROADS ACM STUDE, V2