Clustering Algorithm Based on Outlier Detection for Anomaly Intrusion Detection

被引:3
|
作者
Yin, Shang-Nan [1 ]
Kang, Ho-Seok [1 ]
Kim, Sung-Ryul [1 ]
机构
[1] Konkuk Univ, Div Internet & Multimedia Engn, Seoul, South Korea
来源
JOURNAL OF INTERNET TECHNOLOGY | 2016年 / 17卷 / 02期
基金
新加坡国家研究基金会;
关键词
Clustering algorithm; Intrusion detection; Outlier detection;
D O I
10.6138/JIT.2016.17.2.20150703c
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Many experiments show that outliers have important implications for clustering. However, Most of the clustering algorithm ignores to compute outliers, or does not detect outliers well. In this paper, we present a local deviation factor graph-based (LDFGB) algorithm. We measure the effectiveness of the algorithm by detection rate, false positive rate, false negative rate, time overhead, and so on. This algorithm can accurately detect outliers by calculating the relative distance between the data nodes. It can detect any shape of the cluster and still keep high detection rate for detecting known and unknown attacks. Using KDD CUP99 data sets, the experimental results show that this method is effective for improving the detection rates and false positive rates.
引用
下载
收藏
页码:291 / 299
页数:9
相关论文
共 50 条
  • [1] Anomaly Based Network Intrusion Detection with Unsupervised Outlier Detection
    Zhang, Jiong
    Zulkernine, Mohammad
    2006 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-12, 2006, : 2388 - 2393
  • [2] A Graph-based Clustering Algorithm for Anomaly Intrusion Detection
    Zhou Mingqiang
    Huang Hui
    Wang Qian
    PROCEEDINGS OF 2012 7TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE & EDUCATION, VOLS I-VI, 2012, : 1311 - 1314
  • [3] Anomaly-Based Network Intrusion Detection: An Outlier Detection Techniques
    Kumar, Neeraj
    Kumar, Upendra
    PROCEEDINGS OF THE EIGHTH INTERNATIONAL CONFERENCE ON SOFT COMPUTING AND PATTERN RECOGNITION (SOCPAR 2016), 2018, 614 : 262 - 269
  • [4] Algorithm optimization and anomaly detection simulation based on extended Jarvis-Patrick clustering and outlier detection
    Wang, Wei
    Hu, Xiaohui
    Du, Yao
    ALEXANDRIA ENGINEERING JOURNAL, 2022, 61 (03) : 2106 - 2115
  • [5] An Effective Algorithm of Outlier Detection Based on Clustering
    Xia, Qingsong
    Xing, Changzheng
    Li, Na
    INTERNET OF THINGS-BK, 2012, 312 : 346 - 351
  • [6] An Outlier Detection Algorithm Based on Spectral Clustering
    Yang, Peng
    Huang, Biao
    PACIIA: 2008 PACIFIC-ASIA WORKSHOP ON COMPUTATIONAL INTELLIGENCE AND INDUSTRIAL APPLICATION, VOLS 1-3, PROCEEDINGS, 2008, : 485 - 488
  • [7] Outlier Detection Algorithm Based on Iterative Clustering
    古平
    罗辛
    杨瑞龙
    张程
    Journal of Donghua University(English Edition), 2015, 32 (04) : 554 - 558
  • [8] A Network Intrusion Detection Algorithm Based on Outlier Mining
    Ding, Tianyi
    Zhang, Min
    He, Dongjie
    COMMUNICATIONS, SIGNAL PROCESSING, AND SYSTEMS, 2019, 463 : 1229 - 1236
  • [9] Anomaly intrusion detection based on clustering a data stream
    Oh, Sang-Hyun
    Kang, Jin-Suk
    Bytin, Yung-Cheol
    Jeong, Taikyeong T.
    Lee, Won-Suk
    INFORMATION SECURITY, PROCEEDINGS, 2006, 4176 : 415 - 426
  • [10] Intrusion Detection System (IDS): Anomaly Detection using Outlier Detection Approach
    Jabez, J.
    Muthukumar, B.
    INTERNATIONAL CONFERENCE ON COMPUTER, COMMUNICATION AND CONVERGENCE (ICCC 2015), 2015, 48 : 338 - 346