Anomaly detection based on unsupervised niche clustering with application to network intrusion detection

被引:29
|
作者
Leon, E [1 ]
Nasraoui, F [1 ]
Gomez, J [1 ]
机构
[1] Univ Memphis, Dept Elect & Comp Engn, Memphis, TN 38152 USA
关键词
D O I
10.1109/CEC.2004.1330898
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
We present a new approach to anomaly detection based on the Unsupervised Niche Clustering (UNC). The UNC is a genetic niching technique for clustering that can handle noise, and is able to determine the number of clusters automatically. The UNC uses the normal samples for generating a profile of the normal space (clusters). Each cluster can later be characterized by a fuzzy membership function that follows a Gaussian shape defined by the evolved cluster centers and radii. The set of memberships are aggregated using a max-or fuzzy operator in order to determine the normalcy level of a data sample. Experiments on synthetic and real data sets, including a network intrusion detection data set, are performed and some results are analyzed and reported.
引用
收藏
页码:502 / 508
页数:7
相关论文
共 50 条
  • [31] Anomaly based Intrusion Detection using Modified Fuzzy Clustering
    Harish, B. S.
    Kumar, S. V. Aruna
    [J]. INTERNATIONAL JOURNAL OF INTERACTIVE MULTIMEDIA AND ARTIFICIAL INTELLIGENCE, 2017, 4 (06): : 54 - 59
  • [32] Anomaly-Based Network Intrusion Detection: An Outlier Detection Techniques
    Kumar, Neeraj
    Kumar, Upendra
    [J]. PROCEEDINGS OF THE EIGHTH INTERNATIONAL CONFERENCE ON SOFT COMPUTING AND PATTERN RECOGNITION (SOCPAR 2016), 2018, 614 : 262 - 269
  • [33] A Hybrid Unsupervised Clustering-Based Anomaly Detection Method
    Guo Pu
    Lijuan Wang
    Jun Shen
    Fang Dong
    [J]. Tsinghua Science and Technology, 2021, 26 (02) : 146 - 153
  • [34] A Hybrid Unsupervised Clustering-Based Anomaly Detection Method
    Pu, Guo
    Wang, Lijuan
    Shen, Jun
    Dong, Fang
    [J]. TSINGHUA SCIENCE AND TECHNOLOGY, 2021, 26 (02) : 146 - 153
  • [35] A DETAILED DESCRIPTION ON UNSUPERVISED HETEROGENEOUS ANOMALY BASED INTRUSION DETECTION FRAMEWORK
    Hajamydeen, Asif Iqbal
    Udzir, Nur Izura
    [J]. SCALABLE COMPUTING-PRACTICE AND EXPERIENCE, 2019, 20 (01): : 113 - 160
  • [36] ANOMALY-BASED NETWORK INTRUSION DETECTION METHODS
    Nevlud, Pavel
    Bures, Miroslav
    Kapicak, Lukas
    Zdralek, Jaroslav
    [J]. ADVANCES IN ELECTRICAL AND ELECTRONIC ENGINEERING, 2013, 11 (06) : 468 - 474
  • [37] Review on Anomaly based Network Intrusion Detection System
    Samrin, Rafath
    Vasumathi, D.
    [J]. 2017 INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONICS, COMMUNICATION, COMPUTER, AND OPTIMIZATION TECHNIQUES (ICEECCOT), 2017, : 141 - 147
  • [38] Anomaly intrusion detection system based on neural network
    Li, Yuan-Bing
    Fang, Ding-Yi
    Wu, Xiao-Nan
    Chen, Xiao-Jiang
    [J]. Xi Tong Gong Cheng Yu Dian Zi Ji Shu/Systems Engineering and Electronics, 2005, 27 (09): : 1648 - 1651
  • [39] Anomaly-Based Network Intrusion Detection System
    Villalba, L. J. G.
    Orozco, A. L. S.
    Vidal, J. M.
    [J]. IEEE LATIN AMERICA TRANSACTIONS, 2015, 13 (03) : 850 - 855
  • [40] LSTM for Anomaly-Based Network Intrusion Detection
    Althubiti, Sara A.
    Jones, Eric Marcell, Jr.
    Roy, Kaushik
    [J]. 2018 28TH INTERNATIONAL TELECOMMUNICATION NETWORKS AND APPLICATIONS CONFERENCE (ITNAC), 2018, : 293 - 295