Anomaly Detection Algorithm Based on CFSFDP

被引:7
作者
Ren, Weiwu [1 ]
Zhang, Jianfei [1 ]
Di, Xiaoqiang [1 ]
Lu, Yinan [2 ]
Zhang, Bochen [2 ]
Zhao, Jianping [1 ]
机构
[1] Changchun Univ Sci & Technol, Sch Comp Sci & Technol, 7089 Weixing Rd, Changchun 130022, Jilin, Peoples R China
[2] Jilin Univ, Coll Comp Sci & Technol, 2699 Qianjin St, Changchun 130012, Jilin, Peoples R China
关键词
anomaly detection; density clustering; generating profiles; profiles precision; INTRUSION DETECTION;
D O I
10.20965/jaciii.2020.p0453
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Clustering by fast search and find of density peak (CFSFDP) is a simple and crisp density-clustering algorithm. The original algorithm is not suitable for direct application to anomaly detection. Its clustering results have a high level of redundant density information. If used directly as behavior profiles, the computation and storage costs of anomaly detection are high. Therefore, an improved algorithm based on CFSFDP is proposed for anomaly detection. The improved algorithm uses a few data points and their radius to support behavior profiles, and deletes the redundant data points without supporting profiles. This method not only reduces the large amount of data storage and distance calculation in the process of generating profiles, but also reduces the search space of profiles in the detection process. Numerous experiments show that the improved algorithm generates profiles faster than density-based spatial clustering of application with noise (DBSCAN), and has better profile precision than adaptive real-time anomaly detection with incremental clustering (ADWICE). The improved algorithm inherits the arbitrary shape clusters of CFSFDP, and improves the storage and computation performance. Compared with DBSCAN and ADWICE, the improved anomaly-detection algorithm based on CFSFDP has more balanced detection precision and real-time performance.
引用
收藏
页码:453 / 460
页数:8
相关论文
共 17 条
[1]  
Backlund Henrik., 2011, Dbscan: A Density-Based Spatial Clustering Of Application With Noise
[2]  
Burguera I., 2011, P 1 ACM WORKSHOP SEC, P15
[3]   Online and Scalable Unsupervised Network Anomaly Detection Method [J].
Dromard, Juliette ;
Roudiere, Gilles ;
Owezarski, Philippe .
IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2017, 14 (01) :34-47
[4]  
Fans K., VIRUS SAMPLE DATA AR
[5]   A novel ensembled technique for anomaly detection [J].
Garg, Sahil ;
Batra, Shalini .
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2017, 30 (11)
[6]   Multiple-Features-Based Semisupervised Clustering DDoS Detection Method [J].
Gu, Yonghao ;
Wang, Yongfei ;
Yang, Zhen ;
Xiong, Fei ;
Gao, Yimu .
MATHEMATICAL PROBLEMS IN ENGINEERING, 2017, 2017
[7]   Anomaly based Intrusion Detection using Modified Fuzzy Clustering [J].
Harish, B. S. ;
Kumar, S. V. Aruna .
INTERNATIONAL JOURNAL OF INTERACTIVE MULTIMEDIA AND ARTIFICIAL INTELLIGENCE, 2017, 4 (06) :54-59
[8]   Intrusion detection in network flows based on an optimized clustering criterion [J].
Karimpour, Jaber ;
Lotfi, Shahriar ;
Tajari Siahmarzkooh, Aliakbar .
TURKISH JOURNAL OF ELECTRICAL ENGINEERING AND COMPUTER SCIENCES, 2017, 25 (03) :1963-1975
[9]  
Nadjm-Tehrani S., 2007, Information Security Technical Report, V12, P56, DOI 10.1016/j.istr.2007.02.004
[10]  
Oh SH, 2003, COMPUT SECUR, V22, P596, DOI 10.1016/S0167-4048(03)00710-7