The Application of Fuzzy Clustering Number Algorithm in Network Intrusion Detection

2013 ◽  
Vol 760-762 ◽  
pp. 2220-2223
Author(s):  
Lang Guo

In view of the defects of K-means algorithm in intrusion detection: the need of preassign cluster number and sensitive initial center and easy to fall into local optimum, this paper puts forward a fuzzy clustering algorithm. The fuzzy rules are utilized to express the invasion features, and standardized matrix is adopted to further process so as to reflect the approximation degree or correlation degree between the invasion indicator data and establish a similarity matrix. The simulation results of KDD CUP1999 data set show that the algorithm has better intrusion detection effect and can effectively detect the network intrusion data.

2021 ◽  
Author(s):  
Wu Tao ◽  
Fan Honghui ◽  
Zhu HongJin ◽  
You CongZhe ◽  
Zhou HongYan ◽  
...  

Abstract Network security is subject to malicious attacks from multiple sources, and intrusion detection systems (IDS) play a key role in maintaining network security. During the training of intrusion detection models, the detection results generally have relatively large false detection rates due to the shortage of training data caused by data imbalance. To address the existing sample imbalance problem, this paper proposed a network intrusion detection algorithm based on enhanced random forest and Synthetic Minority Over-Sampling Technique (SMOTE) algorithm. Firstly, the method used a hybrid algorithm combining the K-means clustering algorithm with the SMOTE sampling algorithm to increase the number of minor samples and thus achieved a balanced data set, by which the sample features of minor samples could be learned more effectively. Secondly, preliminary prediction result was obtained by using enhanced random forest, and then the similarity matrix of network attacks was used to correct the prediction results of voting processing by the analysis of the type of network attacks. In this paper, the performance was tested using the NSL-KDD dataset with a classification accuracy of 99.72% on the training set and 78.47% on the test set. Compared with other related papers, our method has some improvement in the classification accuracy of detection.


Author(s):  
Soukaena Hassan Hashem

This chapter aims to build a proposed Wire/Wireless Network Intrusion Detection System (WWNIDS) to detect intrusions and consider many of modern attacks which are not taken in account previously. The proposal WWNIDS treat intrusion detection with just intrinsic features but not all of them. The dataset of WWNIDS will consist of two parts; first part will be wire network dataset which has been constructed from KDD'99 that has 41 features with some modifications to produce the proposed dataset that called modern KDD and to be reliable in detecting intrusion by suggesting three additional features. The second part will be building wireless network dataset by collecting thousands of sessions (normal and intrusion); this proposed dataset is called Constructed Wireless Data Set (CWDS). The preprocessing process will be done on the two datasets (KDD & CWDS) to eliminate some problems that affect the detection of intrusion such as noise, missing values and duplication.


Author(s):  
Wentie Wu ◽  
Shengchao Xu

In view of the fact that the existing intrusion detection system (IDS) based on clustering algorithm cannot adapt to the large-scale growth of system logs, a K-mediods clustering intrusion detection algorithm based on differential evolution suitable for cloud computing environment is proposed. First, the differential evolution algorithm is combined with the K-mediods clustering algorithm in order to use the powerful global search capability of the differential evolution algorithm to improve the convergence efficiency of large-scale data sample clustering. Second, in order to further improve the optimization ability of clustering, a dynamic Gemini population scheme was adopted to improve the differential evolution algorithm, thereby maintaining the diversity of the population while improving the problem of being easily trapped into a local optimum. Finally, in the intrusion detection processing of big data, the optimized clustering algorithm is designed in parallel under the Hadoop Map Reduce framework. Simulation experiments were performed in the open source cloud computing framework Hadoop cluster environment. Experimental results show that the overall detection effect of the proposed algorithm is significantly better than the existing intrusion detection algorithms.


2014 ◽  
Vol 651-653 ◽  
pp. 547-550
Author(s):  
Qi Fan Yang ◽  
Li Na Wang

Fuzzy C-means clustering algorithm (FCM) is widely applied to the intrusion detection. To acquire a better division for intrusion data, a new method (DEFCM) presented in the paper which combines FCM and differential evolution algorithm (DE) is found application. As a start, several randomly initiated partitions are optimized by FCM, and then the result is provided to differential evolution algorithm. After that, the combined result is sent to FCM again to adjust the partition and obtain the final answer. The method can improve detection performance effectively. The KDDCUP1999 data set is used in the simulation experiment, and the result proves that the DEFCM algorithm has a comparatively high detection rate in intrusion detection.


2011 ◽  
Vol 219-220 ◽  
pp. 1263-1266
Author(s):  
Xi Huai Wang ◽  
Jian Mei Xiao

A neural network soft sensor based on fuzzy clustering is presented. The training data set is separated into several clusters with different centers, the number of fuzzy cluster is decided automatically, and the clustering centers are modified using an adaptive fuzzy clustering algorithm in the online stage. The proposed approach has been applied to the slab temperature estimation in a practical walking beam reheating furnace. Simulation results show that the approach is effective.


2018 ◽  
Vol 56 (2) ◽  
pp. 257 ◽  
Author(s):  
Mai Dinh Sinh ◽  
Ngo Thanh Long ◽  
Trinh Le Hang

Spectral clustering is a clustering method based on algebraic graph theory. The clustering effect by using spectral method depends heavily on the description of similarity between instances of the datasets. Althought, spectral clustering has been significant interest in recent times, but the raw spectral clustering is often based on Euclidean distance, but it is impossible to accurately reflect the complexity of the data. Despite having a well-defined mathematical framework, good performance and simplicity, it suffers from several drawbacks, such as it is unable to determine a reasonable cluster number, sensitive to initial condition and not robust to outliers. In this paper, we present a new approach named spatial-spectral fuzzy clustering which combines spectral clustering and fuzzy clustering with spatial information into a unified framework to solve these problems, the paper consists of three main steps: Step 1, calculate the spatial information value of the pixels, step 2 applies the spectral clustering algorithm to change the data space from the color space to the new space and step 3 clusters the data in new data space by fuzzy clustering algorithm. Experimental results on the remote sensing image were evaluated based on a number of indicators, such as IQI, MSE, DI and CSI, show that it can improve the clustering accuracy and avoid falling into local optimum. 


Sign in / Sign up

Export Citation Format

Share Document