Fuzzy Clustering Based Anomaly Detection for Updating Intrusion Detection Signature Files

被引:0
|
作者
Padath, Anish Abraham [1 ,2 ,3 ]
Endicott-Popovsky, Barbara [1 ,2 ]
机构
[1] Univ Washington, Campus Hlth Serv Adm, Seattle, WA 98195 USA
[2] Univ Washington, Ctr Informat Assurance & Cybersecur, Seattle, WA 98195 USA
[3] Univ Washington, Seattle Campus, Seattle, WA USA
来源
关键词
Intrusion detection system; misuse detection system; anomaly detection system; fuzzy clustering;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The majority of systems today categorize data either by misuse detection or anomaly detection: each approach has its relative merits and demerits. Perfect detection, like perfect security, is simply not an attainable goal given the complexity and rapid evolution of modern systems. An Intrusion Detection System (IDS) can, however, strive to raise the bar for attackers by reducing the efficacy of large classes of attacks and increasing the work factor required to achieve a system compromise. The coordinated deployment of multiple intrusion detection systems promises to allow greater confidence in the results of and to improve the coverage of intrusion detection, making this a critical component of any comprehensive security architecture. Traditional anomaly detection methods lack adaptive captivity in complex and heterogeneous network. Especially while facing high noise environments, or the situation of updating profiles not in time, intrusion detection systems will have high false alarm rate. In this research study, anomaly detection based on fuzzy clustering is proposed for updating signature files. Fuzzy clustering integrates the advantage of fuzzy set theory and conventional clustering algorithms so that the improved algorithm can identify zero day attacks (anomalies), which conventional misuse network intrusion detection would fail to detect. The approach allows recognizing not only known attacks but also to detect suspicious activity that may be the result of a new, unknown attack. Once new attacks are detected, then this information could be used to update the signature files of the misuse intrusion detection systems.
引用
收藏
页码:462 / 468
页数:7
相关论文
共 50 条
  • [31] An intrusion detection method for internet of things based on suppressed fuzzy clustering
    Liqun Liu
    Bing Xu
    Xiaoping Zhang
    Xianjun Wu
    [J]. EURASIP Journal on Wireless Communications and Networking, 2018
  • [32] An intrusion detection method for internet of things based on suppressed fuzzy clustering
    Liu, Liqun
    Xu, Bing
    Zhang, Xiaoping
    Wu, Xianjun
    [J]. EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2018,
  • [33] The Complex Method of Intrusion Detection Based on Anomaly Detection and Misuse Detection
    Radivilova, Tamara
    Kirichenko, Lyudmyla
    Alghawli, Abed Saif
    Ilkov, Andrii
    Tawalbeh, Maxim
    Zinchenko, Petro
    [J]. 2020 IEEE 11TH INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS, SERVICES AND TECHNOLOGIES (DESSERT): IOT, BIG DATA AND AI FOR A SAFE & SECURE WORLD AND INDUSTRY 4.0, 2020, : 133 - 137
  • [34] Another Fuzzy Anomaly Detection System Based on Ant Clustering Algorithm
    Aminanto, Muhamad Erza
    Kim, HakJu
    Kim, Kyung-Min
    Kim, Kwangjo
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2017, E100A (01) : 176 - 183
  • [35] Network Traffic Classification for Anomaly Detection Fuzzy Clustering Based Approach
    Asmuss, Julija
    Lauks, Gunars
    [J]. 2015 12TH INTERNATIONAL CONFERENCE ON FUZZY SYSTEMS AND KNOWLEDGE DISCOVERY (FSKD), 2015, : 313 - 318
  • [36] Compound Fuzzy Clustering Anomaly Detection Based on Production Process Coupling
    Fu, Mengyao
    Li, Yangzhao
    Zhang, Mengfan
    Feng, Dongqin
    Chen, Qingyun
    Jiang, Ying
    [J]. 2020 CHINESE AUTOMATION CONGRESS (CAC 2020), 2020, : 5708 - 5713
  • [37] Anomaly Intrusion Detection Based Upon Data Mining Techniques and Fuzzy Logic
    Yu, Yingbing
    Wu, Han
    [J]. PROCEEDINGS 2012 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN, AND CYBERNETICS (SMC), 2012, : 514 - 517
  • [38] Signature-Based Anomaly Intrusion Detection using Integrated Data Mining Classifiers
    Yassin, Warusia
    Udzir, Nur Izura
    Abdullah, Azizol
    Abdullah, Mohd Taufik
    Zulzalil, Hazura
    Muda, Zaiton
    [J]. 2014 INTERNATIONAL SYMPOSIUM ON BIOMETRICS AND SECURITY TECHNOLOGIES (ISBAST), 2014, : 232 - 237
  • [39] Detection and classification of anomaly intrusion using hierarchy clustering and SVM
    Tang, Chenghua
    Xiang, Yang
    Wang, Yu
    Qian, Junyan
    Qiang, Baohua
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (16) : 3401 - 3411
  • [40] An anomaly intrusion detection method by clustering normal user behavior
    Oh, SH
    Lee, WS
    [J]. COMPUTERS & SECURITY, 2003, 22 (07) : 596 - 612