Fuzzy Clustering Based Anomaly Detection for Updating Intrusion Detection Signature Files

被引:0
|
作者
Padath, Anish Abraham [1 ,2 ,3 ]
Endicott-Popovsky, Barbara [1 ,2 ]
机构
[1] Univ Washington, Campus Hlth Serv Adm, Seattle, WA 98195 USA
[2] Univ Washington, Ctr Informat Assurance & Cybersecur, Seattle, WA 98195 USA
[3] Univ Washington, Seattle Campus, Seattle, WA USA
来源
关键词
Intrusion detection system; misuse detection system; anomaly detection system; fuzzy clustering;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The majority of systems today categorize data either by misuse detection or anomaly detection: each approach has its relative merits and demerits. Perfect detection, like perfect security, is simply not an attainable goal given the complexity and rapid evolution of modern systems. An Intrusion Detection System (IDS) can, however, strive to raise the bar for attackers by reducing the efficacy of large classes of attacks and increasing the work factor required to achieve a system compromise. The coordinated deployment of multiple intrusion detection systems promises to allow greater confidence in the results of and to improve the coverage of intrusion detection, making this a critical component of any comprehensive security architecture. Traditional anomaly detection methods lack adaptive captivity in complex and heterogeneous network. Especially while facing high noise environments, or the situation of updating profiles not in time, intrusion detection systems will have high false alarm rate. In this research study, anomaly detection based on fuzzy clustering is proposed for updating signature files. Fuzzy clustering integrates the advantage of fuzzy set theory and conventional clustering algorithms so that the improved algorithm can identify zero day attacks (anomalies), which conventional misuse network intrusion detection would fail to detect. The approach allows recognizing not only known attacks but also to detect suspicious activity that may be the result of a new, unknown attack. Once new attacks are detected, then this information could be used to update the signature files of the misuse intrusion detection systems.
引用
收藏
页码:462 / 468
页数:7
相关论文
共 50 条
  • [1] Anomaly based Intrusion Detection using Modified Fuzzy Clustering
    Harish, B. S.
    Kumar, S. V. Aruna
    [J]. INTERNATIONAL JOURNAL OF INTERACTIVE MULTIMEDIA AND ARTIFICIAL INTELLIGENCE, 2017, 4 (06): : 54 - 59
  • [2] Anomaly-based intrusion detection using fuzzy rough clustering
    Chimphlee, Witcha
    Abdullah, Abdul Hanan
    Sap, Mohd Noor Md
    Srinoy, Surat
    Chimphlee, Siriporn
    [J]. 2006 International Conference on Hybrid Information Technology, Vol 1, Proceedings, 2006, : 329 - 334
  • [3] Anomaly intrusion detection based on dynamic cluster updating
    Oh, Sang-Hyun
    Lee, Won-Suk
    [J]. ADVANCES IN KNOWLEDGE DISCOVERY AND DATA MINING, PROCEEDINGS, 2007, 4426 : 737 - +
  • [4] Clustering Algorithm Based on Outlier Detection for Anomaly Intrusion Detection
    Yin, Shang-Nan
    Kang, Ho-Seok
    Kim, Sung-Ryul
    [J]. JOURNAL OF INTERNET TECHNOLOGY, 2016, 17 (02): : 291 - 299
  • [5] Anomaly intrusion detection based on clustering a data stream
    Oh, Sang-Hyun
    Kang, Jin-Suk
    Bytin, Yung-Cheol
    Jeong, Taikyeong T.
    Lee, Won-Suk
    [J]. INFORMATION SECURITY, PROCEEDINGS, 2006, 4176 : 415 - 426
  • [6] Fuzzy clustering for intrusion detection
    Shah, H
    Undercoffer, J
    Joshi, A
    [J]. PROCEEDINGS OF THE 12TH IEEE INTERNATIONAL CONFERENCE ON FUZZY SYSTEMS, VOLS 1 AND 2, 2003, : 1274 - 1278
  • [7] Optimized clustering for anomaly intrusion detection
    Oh, SH
    Lee, WS
    [J]. ADVANCES IN KNOWLEDGE DISCOVERY AND DATA MINING, 2003, 2637 : 576 - 581
  • [8] A Fuzzy Measure for Intrusion and Anomaly Detection
    Aljawarneh, Shadi A.
    RadhaKrishna, V.
    Kumar, G. Rajesh
    [J]. 2017 INTERNATIONAL CONFERENCE ON ENGINEERING & MIS (ICEMIS), 2017,
  • [9] Anomaly detection based on unsupervised niche clustering with application to network intrusion detection
    Leon, E
    Nasraoui, F
    Gomez, J
    [J]. CEC2004: PROCEEDINGS OF THE 2004 CONGRESS ON EVOLUTIONARY COMPUTATION, VOLS 1 AND 2, 2004, : 502 - 508
  • [10] Anomaly detection based Intrusion Detection
    Novikov, Dima
    Yampolskiy, Roman V.
    Reznik, Leon
    [J]. THIRD INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: NEW GENERATIONS, PROCEEDINGS, 2006, : 420 - +