A new approach to intrusion detection using Artificial Neural Networks and fuzzy clustering

被引:303
作者
Wang, Gang [1 ,2 ]
Hao, Jinxing [1 ,3 ]
Ma, Jian [1 ]
Huang, Lihua [2 ]
机构
[1] City Univ Hong Kong, Dept Informat Syst, Kowloon, Hong Kong, Peoples R China
[2] Fudan Univ, Sch Management, Shanghai 200433, Peoples R China
[3] Beihang Univ, Sch Econ & Management, Beijing 100083, Peoples R China
关键词
Intrusion detection systems; Artificial Neural Networks; Fuzzy clustering; IDS;
D O I
10.1016/j.eswa.2010.02.102
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Many researches have argued that Artificial Neural Networks (ANNs) can improve the performance of intrusion detection systems (IDS) when compared with traditional methods. However for ANN-based IDS, detection precision, especially for low-frequent attacks, and detection stability are still needed to be enhanced. In this paper, we propose a new approach, called FC-ANN, based on ANN and fuzzy clustering, to solve the problem and help IDS achieve higher detection rate, less false positive rate and stronger stability. The general procedure of FC-ANN is as follows: firstly fuzzy clustering technique is used to generate different training subsets. Subsequently, based on different training subsets, different ANN models are trained to formulate different base models. Finally, a meta-learner, fuzzy aggregation module, is employed to aggregate these results. Experimental results on the KDD CUP 1999 dataset show that our proposed new approach, FC-ANN, outperforms BPNN and other well-known methods such as decision tree, the naive Bayes in terms of detection precision and detection stability. (C) 2010 Elsevier Ltd. All rights reserved.
引用
收藏
页码:6225 / 6232
页数:8
相关论文
共 33 条
  • [1] Anderson J.A., 1995, An Introduction to Neural Networks, DOI DOI 10.7551/MITPRESS/3905.001.0001
  • [2] [Anonymous], 1980, Computer Security Threat Monitoring and Surveillance
  • [3] [Anonymous], 1994, Journal of intelligent and Fuzzy systems
  • [4] [Anonymous], P NGDM
  • [5] [Anonymous], 1999, Kdd cup 1999 dataset
  • [6] AXELSSON S, 2003, ACM T INFORM SYSTEM, V3, P186
  • [7] BARBARA D, 2001, P 1 SIAM C DAT MIN C, P1
  • [8] Critical study of neural networks in detecting intrusions
    Beghdad, Rachid
    [J]. COMPUTERS & SECURITY, 2008, 27 (5-6) : 168 - 175
  • [9] Bezdek JC., 1973, Fuzzy Mathematics in Pattern Classification
  • [10] Hybrid flexible neural-tree-based intrusion detection systems
    Chen, Yuehui
    Akbraham, Ajith
    Yang, Bo
    [J]. INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS, 2007, 22 (04) : 337 - 352