A clustering algorithm for intrusion detection

被引:13
作者
Wang, Q [1 ]
Megalooikonomou, V [1 ]
机构
[1] Temple Univ, Data Engn Lab, Dept Comp & Informat Sci, Philadelphia, PA 19122 USA
来源
DATA MINING, INTRUSION DETECTION, INFORMATION ASSURANCE, AND DATA NETWORKS SECURITY 2005 | 2005年 / 5812卷
关键词
intrusion detection; data mining; clustering; fuzzy connectedness;
D O I
10.1117/12.603567
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In this paper, we introduce a new clustering algorithm, FCC, for intrusion detection based on the concept of fuzzy connectedness. This concept was introduced by Rosenfeld in 1979 and used with success in image segmentation; here we extend this approach to clustering and demonstrate its effectiveness in intrusion detection. Starting with a single or a few seed points in each cluster, all the data points are dynamically assigned to the cluster that has the highest fuzzy connectedness value (strongest connection). With an efficient heuristic algorithm, the time complexity of the clustering process is O(NlogN), where N is the number of data points. The value of fuzzy connectedness is calculated using both the Euclidean distance and the statistical properties of clusters. This unsupervised learning method allows the discovery of clusters of any shape. Application of the method in intrusion detection demonstrates that it can detect not only known intrusion types, but also their variants. Experimental results on the KDD-99 intrusion detection data set show the efficiency and accuracy of this method. A detection rate above 94% and a false alarm rate below 4% are achieved, outperforming major competitors by at least 5%.
引用
收藏
页码:31 / 38
页数:8
相关论文
共 10 条
[1]  
[Anonymous], 1999, KDD CUP 1999 DATA
[2]  
[Anonymous], 2001, 80031 NIST
[3]  
GUAN Y, 2003, P CAN C EL COMP ENG
[4]   Multiseeded segmentation using fuzzy connectedness [J].
Herman, GT ;
Carvalho, BM .
IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 2001, 23 (05) :460-474
[5]  
LI X, 2003, REAL TIME SYSTEM SEC
[6]  
PHUNG M, 2000, INTRUSION DETECTION
[7]  
PORTNOY L, 2001, ADV NEURAL INFORMATI, V10
[8]   FUZZY DIGITAL TOPOLOGY [J].
ROSENFELD, A .
INFORMATION AND CONTROL, 1979, 40 (01) :76-87
[9]   Fuzzy connectedness and object definition: Theory, algorithms, and applications in image segmentation [J].
Udupa, JK ;
Samarasekera, S .
GRAPHICAL MODELS AND IMAGE PROCESSING, 1996, 58 (03) :246-261
[10]  
Zhong S, 2004, EIGHTH IEEE INTERNATIONAL SYMPOSIUM ON HIGH ASSURANCE SYSTEMS ENGINEERING, PROCEEDINGS, P149