Another Fuzzy Anomaly Detection System Based on Ant Clustering Algorithm

Cited 16 time in webofscience Cited 0 time in scopus
  • Hit : 1103
  • Download : 0
DC FieldValueLanguage
dc.contributor.authorAminanto, Muhamad Erzako
dc.contributor.authorKim, Hakjuko
dc.contributor.authorKim, Kyung-Minko
dc.contributor.authorKim, Kwangjoko
dc.date.accessioned2017-03-28T06:54:52Z-
dc.date.available2017-03-28T06:54:52Z-
dc.date.created2016-11-20-
dc.date.created2016-11-20-
dc.date.created2016-11-20-
dc.date.issued2017-01-
dc.identifier.citationIEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, v.E100A, no.1, pp.176 - 183-
dc.identifier.issn1745-1337-
dc.identifier.urihttp://hdl.handle.net/10203/220944-
dc.description.abstractAttacks against computer networks are evolving rapidly. Conventional intrusion detection system based on pattern matching and static signatures have a significant limitation since the signature database should be updated frequently. The unsupervised learning algorithm can overcome this limitation. Ant Clustering Algorithm (ACA) is a popular unsupervised learning algorithm to classify data into different categories. However, ACA needs to be complemented with other algorithms for the classification process. In this paper, we present a fuzzy anomaly detection system that works in two phases. In the first phase, the training phase, we propose ACA to determine clusters. In the second phase, the classification phase, we exploit a fuzzy approach by the combination of two distance based methods to detect anomalies in new monitored data. We validate our hybrid approach using the KDD Cup'99 dataset. The results indicate that, compared to several traditional and new techniques, the proposed hybrid approach achieves higher detection rate and lower false positive rate.-
dc.languageEnglish-
dc.publisherIEICE-INST ELECTRONICS INFORMATION COMMUNICATIONS ENG-
dc.subjectINTRUSION DETECTION-
dc.subjectNETWORKS-
dc.titleAnother Fuzzy Anomaly Detection System Based on Ant Clustering Algorithm-
dc.typeArticle-
dc.identifier.wosid000393062000018-
dc.identifier.scopusid2-s2.0-85008343612-
dc.type.rimsART-
dc.citation.volumeE100A-
dc.citation.issue1-
dc.citation.beginningpage176-
dc.citation.endingpage183-
dc.citation.publicationnameIEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES-
dc.identifier.doi10.1587/transfun.E100.A.176-
dc.contributor.localauthorKim, Kwangjo-
dc.contributor.nonIdAuthorKim, Hakju-
dc.contributor.nonIdAuthorKim, Kyung-Min-
dc.description.isOpenAccessN-
dc.type.journalArticleArticle-
dc.subject.keywordAuthorunknown attacks-
dc.subject.keywordAuthorunsupervised learning-
dc.subject.keywordAuthorant clustering algorithm-
dc.subject.keywordAuthorfuzzy logic-
dc.subject.keywordPlusINTRUSION DETECTION-
dc.subject.keywordPlusNETWORKS-
Appears in Collection
CS-Journal Papers(저널논문)
Files in This Item
There are no files associated with this item.
This item is cited by other documents in WoS
⊙ Detail Information in WoSⓡ Click to see webofscience_button
⊙ Cited 16 items in WoS Click to see citing articles in records_button

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0