Y-means: A clustering method for intrusion detection

被引:0
|
作者
Guan, Y [1 ]
Ghorbani, AA [1 ]
Belacel, N [1 ]
机构
[1] Univ New Brunswick, Fac Comp Sci, Fredericton, NB E3B 5A3, Canada
来源
CCECE 2003: CANADIAN CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING, VOLS 1-3, PROCEEDINGS: TOWARD A CARING AND HUMANE TECHNOLOGY | 2003年
关键词
clustering; intrusion detection; K-means; outlier;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
As the Internet spreads to each corner of the world, computers are exposed to miscellaneous intrusions from the World Wide Web. We need effective intrusion detection systems to protect our computers from these unauthorized or malicious actions. Traditional instance-based learning methods for Intrusion Detection can only detect known intrusions since these methods classify instances based on what they have learned They rarely detect the intrusions that they have not learned before. In this paper we present a clustering heuristic for intrusion detection, called Y-means. This proposed heuristic is based on the K-means algorithm and other related clustering algorithms. It overcomes two shortcomings of K-means: number of clusters dependency and degeneracy. The result of simulations run on the KDD-99 data set shows that Y-means is an effective method for partitioning large data space. A detection rate of 89.89% and a false alarm rate of 1.00% are achieved with Y-means.
引用
收藏
页码:1083 / 1086
页数:4
相关论文
共 50 条
  • [41] An unsupervised intrusion detection method combined clustering with chaos simulated annealing
    Ni, Lin
    Zheng, Hong-Ying
    PROCEEDINGS OF 2007 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2007, : 3217 - +
  • [42] Advanced Clustering Based Intrusion Detection (ACID) Algorithm
    Borah, Samarjeet
    Chakravorty, Debaditya
    Chawhan, Chandan
    Saha, Aritra
    ADVANCES IN COMPUTING AND COMMUNICATIONS, PT III, 2011, 192 : 35 - 43
  • [43] Design of Clustering Enabled Intrusion Detection with Blockchain Technology
    Vimal, S.
    Nalini, S.
    Anguraj, K.
    Chelladurai, T.
    INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2022, 33 (03) : 1907 - 1921
  • [44] Alarm clustering for intrusion detection systems in computer networks
    Giacinto, G
    Perdisci, R
    Roli, F
    MACHINE LEARNING AND DATA MINING IN PATTERN RECOGNITION, PROCEEDINGS, 2005, 3587 : 184 - 193
  • [45] Intrusion Detection Using Clustering of Network Traffic Flows
    Bailey, Matthew
    Collins, Connor
    Sinda, Matthew
    Hu, Gongzhu
    2017 18TH IEEE/ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING AND PARALLEL/DISTRIBUTED COMPUTING (SNDP 2017), 2017, : 615 - 620
  • [46] An Evaluation of Clustering Technique over Intrusion Detection System
    Nadiammai, G. V.
    Hemalatha, M.
    PROCEEDINGS OF THE 2012 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI'12), 2012, : 1054 - 1060
  • [47] An intrusion detection method for internet of things based on suppressed fuzzy clustering
    Liqun Liu
    Bing Xu
    Xiaoping Zhang
    Xianjun Wu
    EURASIP Journal on Wireless Communications and Networking, 2018
  • [48] Anomaly intrusion detection based on clustering a data stream
    Oh, Sang-Hyun
    Kang, Jin-Suk
    Bytin, Yung-Cheol
    Jeong, Taikyeong T.
    Lee, Won-Suk
    INFORMATION SECURITY, PROCEEDINGS, 2006, 4176 : 415 - 426
  • [49] False Positive Elimination in Intrusion Detection Based on Clustering
    Hu, Liang
    Li, Taihui
    Xie, Nannan
    Hu, Jiejun
    2015 12TH INTERNATIONAL CONFERENCE ON FUZZY SYSTEMS AND KNOWLEDGE DISCOVERY (FSKD), 2015, : 519 - 523
  • [50] Efficient K-means Algorithm in Intrusion Detection
    Yang, Wenjun
    PROCEEDINGS OF THE 2017 2ND INTERNATIONAL CONFERENCE ON MODELLING, SIMULATION AND APPLIED MATHEMATICS (MSAM2017), 2017, 132 : 193 - 195