Clustering Algorithm Based on Outlier Detection for Anomaly Intrusion Detection

被引:3
|
作者
Yin, Shang-Nan [1 ]
Kang, Ho-Seok [1 ]
Kim, Sung-Ryul [1 ]
机构
[1] Konkuk Univ, Div Internet & Multimedia Engn, Seoul, South Korea
来源
JOURNAL OF INTERNET TECHNOLOGY | 2016年 / 17卷 / 02期
基金
新加坡国家研究基金会;
关键词
Clustering algorithm; Intrusion detection; Outlier detection;
D O I
10.6138/JIT.2016.17.2.20150703c
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Many experiments show that outliers have important implications for clustering. However, Most of the clustering algorithm ignores to compute outliers, or does not detect outliers well. In this paper, we present a local deviation factor graph-based (LDFGB) algorithm. We measure the effectiveness of the algorithm by detection rate, false positive rate, false negative rate, time overhead, and so on. This algorithm can accurately detect outliers by calculating the relative distance between the data nodes. It can detect any shape of the cluster and still keep high detection rate for detecting known and unknown attacks. Using KDD CUP99 data sets, the experimental results show that this method is effective for improving the detection rates and false positive rates.
引用
收藏
页码:291 / 299
页数:9
相关论文
共 50 条
  • [21] Anomaly detection based on unsupervised niche clustering with application to network intrusion detection
    Leon, E
    Nasraoui, F
    Gomez, J
    CEC2004: PROCEEDINGS OF THE 2004 CONGRESS ON EVOLUTIONARY COMPUTATION, VOLS 1 AND 2, 2004, : 502 - 508
  • [22] A clustering algorithm for intrusion detection
    Wang, Q
    Megalooikonomou, V
    DATA MINING, INTRUSION DETECTION, INFORMATION ASSURANCE, AND DATA NETWORKS SECURITY 2005, 2005, 5812 : 31 - 38
  • [23] Density Based Outlier Mining Algorithm with Application to Intrusion Detection
    Yang, Peng
    Huang, Biao
    PACIIA: 2008 PACIFIC-ASIA WORKSHOP ON COMPUTATIONAL INTELLIGENCE AND INDUSTRIAL APPLICATION, VOLS 1-3, PROCEEDINGS, 2008, : 489 - 492
  • [24] Anomaly detection based Intrusion Detection
    Novikov, Dima
    Yampolskiy, Roman V.
    Reznik, Leon
    THIRD INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: NEW GENERATIONS, PROCEEDINGS, 2006, : 420 - +
  • [25] A Clustering-Based Unsupervised Approach to Anomaly Intrusion Detection
    Nikolova, Evgeniya
    Jecheva, Veselina
    PROCEEDINGS OF THE 2ND INTERNATIONAL SYMPOSIUM ON COMPUTER, COMMUNICATION, CONTROL AND AUTOMATION, 2013, 68 : 202 - 205
  • [26] Anomaly based Intrusion Detection using Modified Fuzzy Clustering
    Harish, B. S.
    Kumar, S. V. Aruna
    INTERNATIONAL JOURNAL OF INTERACTIVE MULTIMEDIA AND ARTIFICIAL INTELLIGENCE, 2017, 4 (06): : 54 - 59
  • [27] Clustering based on swarm intelligence with application to anomaly intrusion detection
    Feng, Y
    Wu, KG
    Wu, ZF
    Zhong, J
    Li, H
    Proceedings of the 11th Joint International Computer Conference, 2005, : 488 - 491
  • [28] A Spectral Clustering Algorithm for Outlier Detection
    Yang, Peng
    Huang, Biao
    2008 INTERNATIONAL SEMINAR ON FUTURE INFORMATION TECHNOLOGY AND MANAGEMENT ENGINEERING, PROCEEDINGS, 2008, : 33 - 36
  • [29] Anomaly Based Intrusion Detection Based on the Junction Tree Algorithm
    Nikolova, Evgeniya
    Jecheva, Veselina
    JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2007, 2 (03): : 184 - 188
  • [30] LDFGB Algorithm for Anomaly Intrusion Detection
    Yin, Shang-nan
    Chen, Zhi-guo
    Kim, Sung-Ryul
    INFORMATION AND COMMUNICATION TECHNOLOGY, 2014, 8407 : 396 - 404