By Topic

Applying fuzzy data mining to network unsupervised anomaly detection

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

3 Author(s)
Gao Xiang ; Sch. of Comput., Northwestern Polytech Univ., Xi''an, China ; Wang Min ; Rongchun, Z.

Most current intrusion detection system employ signature-based methods or data mining-based methods which rely on labeled training data, however, in practice, this training data is typically expensive to produce. In contrast, unsupervised anomaly detection has great utility within the context of network intrusion detection system. Such a system can work without the need for massive sets of pre-labeled training data and has the added versatility of being free of the over specialization that comes with systems tailored for specific sets of attacks. Thus, with a system that seeks only to define and categorize normalcy, there is the potential to detect new types of network attacks without any prior knowledge of their existence. This paper discusses the creation of such a system that uses a fuzzy cluster algorithm to detect anomalies in network connections; we evaluate our method by performing experiments over network records from the KDD CUP99 data set.

Published in:

Communications and Information Technology, 2005. ISCIT 2005. IEEE International Symposium on  (Volume:2 )

Date of Conference:

12-14 Oct. 2005