AUTHOR(S): Seyed Mahmood Hashemi, Jingsha He
|
TITLE |
ABSTRACT Clustering of attack patterns is used in intrusion detection and discussed in this paper. Fuzzy CMeans (FCM) is a popular method for clustering; the performance of FCM is depends to its parameters radically. In this paper, performance of FCM is evaluated with some Validity Indices and represented in a multi-objective optimization problem. Multi-Objective Simulated Annealing (AMOSA) has high power to solve multi-objective optimization problems, so it is used in this paper to tune the parameters of FCM. |
KEYWORDS Intrusion Detection, Clustering, FCM, Multi-Objective Optimization, AMOSA |
REFERENCES [1]. Wuling Ren, Jinzhu Cao, Xianjie Wu, “Application of Network Intrusion Detection Based on Fuzzy C-Means Clustering Algorithm”, IEEE, 2009 Third International Symposium on Intelligent Information Technology Application, DOI 10.1109/IITA.2009.269 [2]. Wei Jiang, Min YAO, Jun YAN, “Intrusion Detection Based on Improved Fuzzy C-Means Algorithm”, IEEE, 2008 International Symposium on Information Science and Engineering, DOI 10.1109/ISISE.2008.17 [3]. Lawrence O. Hall, Dmitry Goldgof, “Convergence of the Single-Pass and Online Fuzzy C-Means Algorithm”, IEEE TRANSACTIONS ON FUZZY SYSTEMS, Vol. 19, No. 4, 2011 [4]. Yu Guan, Ali A. Gorbani, Nabil Belacel, “Y-MENAS: A CLUSTERING METHOD FOR INTRUCTION DETECTION”, CCECE 2003 CCGEI 2003, Montr´eal, May/mai 2003 0-7803-7781-8/03/$17.00 c 2003 IEEE [5]. Peiyu LIU, Linshan DUAN, Xuezhi chi, Zhenfang ZHU, “An Improved Fuzzy C-Means Clustering Algorithm Based on Simulated Annealing”, 2013 10th International Conference on Fuzzy Systems and Knowledge Discovery (FSKD) [6]. J. C. Bezdek, “Pattern Recognition with Fuzzy Objective Functions algorithms”, Plenum, New York, 1981 [7]. Xuanli Lisa Xie, Gerardo Beni, “A Validity Measure for Fuzzy Clustering”, IEEE Log Number 9142752, IEEE, TRANSCATIONS ON PATTERN ANALISYS AND MACHINE INTELLIGENCE, Vol. 13, No. 8, 1991 [8]. I. Gath, B. Geva, “Unsupervised Optimal Fuzzy Clustering”, IEEE, TRANSACTION ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, Vol. 11, No. 7, 1989 [9]. Jurgen Beringer, Eyke Hullermeier, “Adaptive Optimization of the Number of Clusters in Fuzzy Clustering”, 1-4244-1210- 2/07/$25.00 C 2007 IEEE. [10]. M. Halkidi, Y. Batistakis, M. Vazigiannis, “Clustering algorithms and validity measures”, 0-7695-1218-6/01 $10.00 0 2001 IEEE [11]. Hyun-Sook Rhee, Kyung-Whan Oh, “A Validity Measure for Fuzzy Clustering and Its Use in Selecting Optimal Number of Clusters”, 0-7803-3645-3/96 $5.00©1996 IEEE [12]. G. V. Nadiamma, M. Hemalatha, “An Evaluation of Clustering Techniques over Intrusion Detection System”, ICACCI’12, August 3-5, 2012, Chennai, T Nadu, India. Copyright 2012 ACM 978-1-4503-1196- 0/12/08…$10.00. [13]. Fangfei Wei, Qingshan Jiang, Liang Shi, Nannan Wu, “An Intrusion Detection System Based on the Clustering Ensemble”, 1-4244- 1035-5/07/$25.00 .2007 IEEE [14]. Qu Zhiming, Wang Xiaoli, Study of Rough Set and Clustering Algorithm in Network Security Management”, IEEE, 2009 International Conference on Networks Security, Wireless Communication and Trusted Computing, DOI 10.1109/NSWCTC.2009.47 [15]. Ming-Chuan Hung, Don-Lin Yang, “An Efficient Fuzzy C-Means Clustering Algorithm”, 0-7695-1 119-8/01 $17.00 0 2001 IEEE [16]. Shou Zhi-qin, Tao Jian-ping, Zhou Jian, “Appling Fuzzy C-Means Clustering Algorithm to Campus Network Security Assessment Based on Characteristics of Weighted Complex Network”, IEEE, 978-1-4244-5326-9/10/$26.00 ©2010 IEEE [17]. Carlos A. Coello Coello, David A. Van Veldhuizen, Gary B. Lamont, “Evolutionary Algorithms for Solving Multi-Objective Problems”, Speringer, 2nd Ed., 2007, pp. 74 [18]. Sanghamitra Bandyopadhyay, Sriparna Saha, Ujjwal Maulik, Kalynmoy Deb, “A Simulated Annealing-Based Multi-Objective Optimization Algorithm: AMOSA”, IEEE, Vol. 12, Issue 3, ISSN 1089-778x, 2008 [19]. R. Babuska, H.B. verbuggen, “Constructing Fuzzy Model By Product Space Clustering”, Delft University of Technology, P.O. Box 5031, NL_2600 GA Delft, The Netherlands [20]. Michio Sugeno, Takahiro Yasukawa, “A Fuzzy-Logic-Based Approach to Qualitative Modeling”, IEEE Transaction On Fuzzy Systems, VOL. 1, NO. 1, Feb 1993 [21]. KDD Cup 1999 Data, University of California, Irvine, http://kdd.ics.uci.edu/databases/kddcup99/kddcu p99.html, 1999. [22]. Jin-Ho Chung, Kyeongcheol Yang, “kFold Cyclotomy and Its Application to Frequency-Hopping Sequences”, IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 57, NO. 4, APRIL 2011 [23]. Juan Diego Rodriguez, Aritz Perez, Jose Antonio Lozano, “Sensitivity Analysis of k-fold Cross Validation in Prediction Error Estimation”, IEEE TRANSACTION ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, VOL. 32, NO. 3, MARCH 2010 |
Cite this paper Seyed Mahmood Hashemi, Jingsha He. (2016) Tuning FCM Parameters with AMOSA. International Journal of Computers, 1, 56-61 |
|