Detecting Anomalous Network Traffic with Combined Fuzzy-Based Approaches

作者: Hai-Tao He , Xiao-Nan Luo , Bao-Lu Liu

DOI: 10.1007/11538356_45

关键词:

摘要: This paper introduces the combined fuzzy-based approaches to detect anomalous network traffic such as DoS/DDoS or probing attacks, which include Adaptive Neuro-Fuzzy Inference System (ANFIS) and Fuzzy C-Means (FCM) clustering. The basic idea of algorithm is: at first using ANFIS original multi-dimensional (M-D) feature space connections is transformed a compact one-dimensional (1-D) space, secondly FCM clustering used classify 1-D into normal.PCA also for dimensional reduction during extraction. combines advantages high accuracy in supervised learning technique speed unsupervised technique. A publicly available DRAPA/KDD99 dataset demonstrate results show their detecting anomalies connections.

参考文章(17)
Dong Seong Kim, Jong Sou Park, Network-based Intrusion Detection with Support vector machines international conference on information networking. pp. 747- 756 ,(2003) , 10.1007/978-3-540-45235-5_73
Won Suk Lee, Sang Hyun Oh, Optimized clustering for anomaly intrusion detection knowledge discovery and data mining. pp. 576- 581 ,(2003) , 10.5555/1760894.1760969
Alexander Hofmann, Carsten Schmitz, Bernhard Sick, Intrusion detection in computer networks with neural and fuzzy classifiers international conference on artificial neural networks. pp. 316- 324 ,(2003) , 10.1007/3-540-44989-2_38
Wenke Lee, S.J. Stolfo, K.W. Mok, A data mining framework for building intrusion detection models ieee symposium on security and privacy. pp. 120- 132 ,(1999) , 10.1109/SECPRI.1999.766909
Manikantan Ramadas, Shawn Ostermann, Brett Tjaden, Detecting Anomalous Network Traffic With Self-Organizing Maps recent advances in intrusion detection. pp. 36- 54 ,(2003) , 10.1007/978-3-540-45248-5_3
T.M. Chen, J.-M. Robert, Worm epidemics in high-speed networks IEEE Computer. ,vol. 37, pp. 48- 53 ,(2004) , 10.1109/MC.2004.36
A. K. Jain, M. N. Murty, P. J. Flynn, Data clustering: a review ACM Computing Surveys. ,vol. 31, pp. 264- 323 ,(1999) , 10.1145/331499.331504
Theuns Verwoerd, Ray Hunt, Intrusion detection techniques and approaches Computer Communications. ,vol. 25, pp. 1356- 1365 ,(2002) , 10.1016/S0140-3664(02)00037-3
J.-S.R. Jang, ANFIS: adaptive-network-based fuzzy inference system systems man and cybernetics. ,vol. 23, pp. 665- 685 ,(1993) , 10.1109/21.256541
D. Moore, V. Paxson, S. Savage, C. Shannon, S. Staniford, N. Weaver, Inside the Slammer worm ieee symposium on security and privacy. ,vol. 1, pp. 33- 39 ,(2003) , 10.1109/MSECP.2003.1219056