+ Site Statistics
+ Search Articles
+ PDF Full Text Service
How our service works
Request PDF Full Text
+ Follow Us
Follow on Facebook
Follow on Twitter
Follow on LinkedIn
+ Subscribe to Site Feeds
Most Shared
PDF Full Text
+ Translate
+ Recently Requested

Min-max hyperellipsoidal clustering for anomaly detection in network security

Min-max hyperellipsoidal clustering for anomaly detection in network security

IEEE Transactions on Systems, Man, and Cybernetics. Part B, Cybernetics 36(4): 887-901

A novel hyperellipsoidal clustering technique is presented for an intrusion-detection system in network security. Hyperellipsoidal clusters toward maximum intracluster similarity and minimum intercluster similarity are generated from training data sets. The novelty of the technique lies in the fact that the parameters needed to construct higher order data models in general multivariate Gaussian functions are incrementally derived from the data sets using accretive processes. The technique is implemented in a feedforward neural network that uses a Gaussian radial basis function as the model generator. An evaluation based on the inclusiveness and exclusiveness of samples with respect to specific criteria is applied to accretively learn the output clusters of the neural network. One significant advantage of this is its ability to detect individual anomaly types that are hard to detect with other anomaly-detection schemes. Applying this technique, several feature subsets of the tcptrace network-connection records that give above 95% detection at false-positive rates below 5% were identified.

Please choose payment method:

(PDF emailed within 0-6 h: $19.90)

Accession: 049595466

Download citation: RISBibTeXText

PMID: 16903372

DOI: 10.1109/tsmcb.2006.870629

Related references

A self-organizing network for hyperellipsoidal clustering (HEC). IEEE Transactions on Neural Networks 7(1): 16-29, 1996

Clustering in wavelet domain: A multiresolution ART network for anomaly detection. Aiche Journal 50(10): 2455-2466, 2004

Hierarchical Kohonenen net for anomaly detection in network security. IEEE Transactions on Systems, Man, and Cybernetics. Part B, Cybernetics 35(2): 302-312, 2005

Anomaly detection method for sensor network data streams based on sliding window sampling and optimized clustering. Safety Science 118: 70-75, 2019

Intrusion Detection System Using Deep Neural Network for In-Vehicle Network Security. Plos One 11(6): E0155781, 2017

A visual-numeric approach to clustering and anomaly detection for trajectory data. Visual Computer 33(3): 265-281, 2017

Single and multi-subject clustering of flow cytometry data for cell-type identification and anomaly detection. Bmc Medical Genomics 9 Suppl 2: 41, 2017

Anomaly detection in a mobile communication network. Computational and Mathematical Organization Theory 13(4): 407-422, 2007

A network clustering algorithm for detection of protein families. Conference Proceedings 2012: 6329-6332, 2013

Network anomaly detection with the restricted Boltzmann machine. Neurocomputing 122: 13-23, 2013

Learning Neural Representations for Network Anomaly Detection. IEEE Transactions on Cybernetics 2018, 2018

Coevolutionary-based Mechanisms for Network Anomaly Detection. Journal of Mathematical Modelling and Algorithms in Operations Research 6(3): 411-431, 2007

Clustering and overlapping modules detection in PPI network based on IBFO. Proteomics 13(2): 278-290, 2013

Network clustering and community detection using modulus of families of loops. Physical Review. E 95(1-1): 012316, 2017

Network anomaly detection system with optimized DS evidence theory. Thescientificworldjournal 2014: 753659, 2015