Anomaly detection based on unsupervised niche clustering with application to network intrusion detection

被引:29
|
作者
Leon, E [1 ]
Nasraoui, F [1 ]
Gomez, J [1 ]
机构
[1] Univ Memphis, Dept Elect & Comp Engn, Memphis, TN 38152 USA
关键词
D O I
10.1109/CEC.2004.1330898
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
We present a new approach to anomaly detection based on the Unsupervised Niche Clustering (UNC). The UNC is a genetic niching technique for clustering that can handle noise, and is able to determine the number of clusters automatically. The UNC uses the normal samples for generating a profile of the normal space (clusters). Each cluster can later be characterized by a fuzzy membership function that follows a Gaussian shape defined by the evolved cluster centers and radii. The set of memberships are aggregated using a max-or fuzzy operator in order to determine the normalcy level of a data sample. Experiments on synthetic and real data sets, including a network intrusion detection data set, are performed and some results are analyzed and reported.
引用
收藏
页码:502 / 508
页数:7
相关论文
共 50 条
  • [1] Anomaly Based Network Intrusion Detection with Unsupervised Outlier Detection
    Zhang, Jiong
    Zulkernine, Mohammad
    [J]. 2006 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-12, 2006, : 2388 - 2393
  • [2] An Unsupervised Network Intrusion Detection Based on Anomaly Analysis
    Zhong, Jiang
    Deng, Xiongbing
    Wen, Luosheng
    Feng, Yong
    [J]. ICICTA: 2009 SECOND INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTATION TECHNOLOGY AND AUTOMATION, VOL II, PROCEEDINGS, 2009, : 367 - +
  • [3] A Clustering-Based Unsupervised Approach to Anomaly Intrusion Detection
    Nikolova, Evgeniya
    Jecheva, Veselina
    [J]. PROCEEDINGS OF THE 2ND INTERNATIONAL SYMPOSIUM ON COMPUTER, COMMUNICATION, CONTROL AND AUTOMATION, 2013, 68 : 202 - 205
  • [4] Clustering based on swarm intelligence with application to anomaly intrusion detection
    Feng, Y
    Wu, KG
    Wu, ZF
    Zhong, J
    Li, H
    [J]. Proceedings of the 11th Joint International Computer Conference, 2005, : 488 - 491
  • [5] A Membership Function for Feature Clustering Based Network Intrusion and Anomaly Detection
    Nagaraja, Arun
    Kumar, T. Satish
    [J]. ICEMIS'18: PROCEEDINGS OF THE FOURTH INTERNATIONAL CONFERENCE ON ENGINEERING AND MIS, 2018,
  • [6] Unsupervised Network Anomaly Detection Based on Abnormality Weights and Subspace Clustering
    Zhao, Xuanqiang
    Wang, Guoying
    Li, Zhixing
    [J]. 2016 SIXTH INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND TECHNOLOGY (ICIST), 2016, : 482 - 486
  • [7] Clustering Algorithm Based on Outlier Detection for Anomaly Intrusion Detection
    Yin, Shang-Nan
    Kang, Ho-Seok
    Kim, Sung-Ryul
    [J]. JOURNAL OF INTERNET TECHNOLOGY, 2016, 17 (02): : 291 - 299
  • [8] Unsupervised anomaly intrusion detection using ant colony clustering model
    Tsang, W
    Kwong, S
    [J]. Soft Computing as Transdisciplinary Science and Technology, 2005, : 223 - 232
  • [9] An artificial immune clustering approach to unsupervised network intrusion detection
    Wang Sifei
    Xu Jiayi
    [J]. PROCEEDINGS OF THE FIRST INTERNATIONAL SYMPOSIUM ON DATA, PRIVACY, AND E-COMMERCE, 2007, : 511 - 513
  • [10] An unsupervised clustering algorithm for intrusion detection
    Guan, Y
    Ghorbani, AA
    Belacel, N
    [J]. ADVANCES IN ARTIFICIAL INTELLIGENCE, PROCEEDINGS, 2003, 2671 : 616 - 617