Open Access Open Access  Restricted Access Subscription or Fee Access

Binary Division Fuzzy C-Means Clustering and Particle Swarm Optimization Based Efficient Intrusion Detection for E-Governance Systems


(*) Corresponding author


Authors' affiliations


DOI: https://doi.org/10.15866/irecos.v11i8.9546

Abstract


With the rapid rise of technology, many unusual and unwanted patterns have been observed in the communication network andrespective systems. This may be attributed to the increase of external threats that cause many security concerns. Such anomalies and unusual behavior lead to a strong need of studying and designing the Intrusion Detection Systems and Clustering. Currently,a variety of clustering methods and their combinations are used to develop an efficient intrusion detection system, but some metrics like low detection rate and high false alarm rate make these models unsatisfactory. The problem of local minima for clustering technique makes their search ability less efficient. An evolutionary technique called particle swarm optimization algorithm, that is based on swarm intelligence, shows a high global maxima search capability. In this paper, these two techniques have been combined to present a novel approach called fuzzy based particle swarm algorithm for the implementation of intrusion detection system. The experiment was conducted on a new data set called Kyoto data set with more number of anomalies. The obtained results were compared with two traditional clustering techniques based on K-Means and Fuzzy C-Means. It was observed that the proposed algorithm outperformed the other two traditional methods on the basis of the Detection Rate and False Alarm rate. In past some researchers have presented the combination of Fuzzy Based Particle Swarm Optimization algorithm to improve the intrusion detection rate,but this rate has been further improved because thealgorithm performance depends on the termination condition and the fitness function value which are new in the proposed algorithm. Moreover, cluster numbers have been considered differently in the past, whereas the proposed algorithm works only on binary clustering.
Copyright © 2016 Praise Worthy Prize - All rights reserved.

Keywords


Intrusion Detection; Fuzzy C-Means Clustering; Particle Swarm Optimization; Detection Rate; E-Governance

Full Text:

PDF


References


Liao, H. J.; Lin, C. H. R.; Lin, Y. C., & Tung, K. Y. Intrusion detection system: A comprehensive review. J. NetwComputAppl, (2013), 36(1), 16-24.
http://dx.doi.org/10.1016/j.jnca.2012.09.004

Anderson, J. P. Computer security threat monitoring and surveillance. Technical report, James P. Anderson Company, Fort Washington, Pennsylvania. February 1980.

Denning, D. E. An intrusion-detection model. Software Engineering, IEEE Transactions, (1987), 13(2), 222-232.
http://dx.doi.org/10.1109/tse.1987.232894

Raghuveer, K. Performance evaluation of data clustering techniques using KDD Cup-99 Intrusion detection data set. Int J Infor Manage Netw Sec, (2012), 1(4), 294-305.
http://dx.doi.org/10.11591/ijins.v1i4.821

Endorf, C. F.; Schultz, E., &Mellander, J. Intrusion detection & prevention. McGraw-Hill Osborne Media, 2004.

Wang, G.; Hao, J.; Ma, J. & Huang, L. A new approach to intrusion detection using Artificial Neural Networks and fuzzy clustering. Expert Systems with Applications, (2010), 37(9), 6225-6232.
http://dx.doi.org/10.1016/j.eswa.2010.02.102

Rathore, S.; Saxena, A. &Manoria, M. Intrusion Detection System on KDDCup99 Dataset: A Survey. Int J ComputSciInfor Tech, (2015), 6 (4), 2015, 3345-3348.

Kaplantzis, S.; Mani, N.; Palaniswanmi, M., & Egan, G. Security models for wireless sensor networks. Centre of Telecommunications and Information Engineering, Monash University, Australia. 2006. (PhD Conversion Report,)

Lazarevic, A.; Ertöz, L.; Kumar, V.; Ozgur, A. &Srivastava, J. A Comparative Study of Anomaly Detection Schemes in Network Intrusion Detection. Siam journal,(2003), 25-36.
http://dx.doi.org/10.1137/1.9781611972733.3

Jianliang, M.; Haikun, S. & Ling, B. The application on intrusion detection based on k-means cluster algorithm. In Information Technology and Applications, IFITA'09. International Forum on. Vol. 1, 2009. pp. 150-152 IEEE.
http://dx.doi.org/10.1109/ifita.2009.34

Ravale, U.; Marathe, N. &Padiya, P. Feature Selection Based Hybrid Anomaly Intrusion Detection System Using K Means and RBF Kernel Function. Procedia Computer Science, (2015), 45, 428-435.
http://dx.doi.org/10.1016/j.procs.2015.03.174

Ren, W.; Cao, J. & Wu, X. Application of network intrusion detection based on Fuzzy C-means clustering algorithm. In Intelligent Information Technology Application, 2009.IITA 2009.Third International Symposium on, Vol. 3, pp. 19-22. IEEE, 2009 November.
http://dx.doi.org/10.1109/iita.2009.269

Xie, L.; Wang, Y.; Chen, L. &Yue, G. An anomaly detection method based on fuzzy C-means clustering algorithm. In The Second International Symposium on Networking and Network Security. (ISNNS) p. 89, April 2010.

Zhang, H. & Zhang, X. Intrusion Detection Based on Improvement of Genetic Fuzzy C-Means Algorithm. In Advances in Information Technology and Industry Applications, Springer Berlin Heidelberg, 2012. pp. 339-346.
http://dx.doi.org/10.1007/978-3-642-26001-8_44

Wang, H.; Zhang, Y. & Li, D. Network intrusion detection based on hybrid Fuzzy C-mean clustering. In Fuzzy Systems and Knowledge Discovery (FSKD), 2010 Seventh International Conference on, Vol. 1, pp. 483-486.IEEE. 2010 August.
http://dx.doi.org/10.1109/fskd.2010.5569762

Li, Z.; Li, Y. &Xu, L. Anomaly intrusion detection method based on k-means clustering algorithm with particle swarm optimization. In Information Technology, Computer Engineering and Management Sciences (ICM), 2011 International Conference on Vol. 2, pp.157-161.IEEE, 2011.
http://dx.doi.org/10.1109/icm.2011.184

Fatma, H. & Mohamed, L. A two-stage technique to improve intrusion detection systems based on data mining algorithms. In Modeling, Simulation and Applied Optimization (ICMSAO), 2013 5th International Conference on. IEEE, pp. 1-6. 2013.
http://dx.doi.org/10.1109/icmsao.2013.6552542

Guolong, C.; Qingliang, C. &Wenzhong, G. A PSO-based approach to rule learning in network intrusion detection. In Fuzzy Information and Engineering, Springer Berlin Heidelberg. 2007. pp. 666-673.
http://dx.doi.org/10.1007/978-3-540-71441-5_72

Chang, Z. & Wei-Ping, W. An improved PSO-based rule extraction algorithm for intrusion detection. In Computational Intelligence and Natural Computing, 2009. CINC'09. International Conference on, Vol. 2, pp. 56-58. IEEE. 2009 June.
http://dx.doi.org/10.1109/cinc.2009.164

Hartigan, J. A., & Wong, M. A. Algorithm AS 136: A k-means clustering algorithm. Applied statistics, (1979), 100-108.
http://dx.doi.org/10.2307/2346830

Bezdek, J. C. (1981). Models for pattern recognition. In Pattern recognition with fuzzy objective function algorithms, Springer US.1981. pp. 1-13.
http://dx.doi.org/10.1007/978-1-4757-0450-1_1

Kennedy, J. &Eberhart, R. Particle Swarm Optimization. Proc of IEEE International Conference on Neural Network, Perth, Australia, In IEEE Service Center Piscataway NJ, 1995: pp. 1942-1948, 1995.

Eberhart, R. & Kennedy, J. A New Optimizer Using Particle Swarm Theory. Proc of 6th International Symposium on Micro Machine and Human Science, Nagoya, Japan. In IEEE Service Center Piscataway NJ, 1995: pp.39-43, 1995.

Bai, Q. Analysis of particle swarm optimization algorithm. Computer and information science, (2010), 3(1), p180.
http://dx.doi.org/10.5539/cis.v3n1p180

Wang, D.; Han, B. & Huang, M. Application of fuzzy c-means clustering algorithm based on particle swarm optimization in computer forensics. Physics Procedia, (2012), 24, 1186-1191.
http://dx.doi.org/10.1016/j.phpro.2012.02.177

Wang, Y. Network Intrusion Detection Technology based on Improved C-means Clustering Algorithm. Journal of Networks, (2013), 8(11), 2541-2547.
http://dx.doi.org/10.4304/jnw.8.11.2541-2547

Yuting, L. U. The Study on the Network Intrusion Detection Based on Improved Particle Swarm Optimization Algorithm. Int J AdvComput Tech, (2013), 5(2), 17-23.
http://dx.doi.org/10.4156/ijact.vol5.issue2.3

Graves, D. &Pedrycz, W. Kernel-based fuzzy clustering and fuzzy clustering: A comparative experimental study. Fuzzy sets and systems, (2010), 161(4), 522-543.
http://dx.doi.org/10.1016/j.fss.2009.10.021

Xiao, L.; Shao, Z. & Liu, G. K-means algorithm based on particle swarm optimization algorithm for anomaly intrusion detection. In Intelligent Control and Automation, 2006. WCICA 2006. The Sixth World Congress on Chicago. Vol. 2, pp. 5854-5858. IEEE. June 2006.
http://dx.doi.org/10.1109/wcica.2006.1714200

Münz, G.; Li, S. & Carle, G. Traffic anomaly detection using k-means clustering. In GI/ITG Workshop MMBnet. September 2007.

Song,J.; Takakura, H. & Okabe, Y. Description of Kyoto University Benchmark Data. Available at link: http://www.takakura.com/Kyoto_data/BenchmarkData-Description-v5.pdf. [Accessed on 19 Feb 2016].

KDD Cup 1999 Data, http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html, Oct. 1999 [Accessed on 19 Feb 2016].

Song, J.; Takakura, H. & Okabe, Y. Cooperation of intelligent honey pots to detect unknown malicious codes. In Information Security Threats Data Collection and Sharing, 2008.WISTDCS'08. WOMBAT Workshop on, IEEE. 2008. pp. 31-39.
http://dx.doi.org/10.1109/wistdcs.2008.10

Portnoy, L.; Eskin, E. &Stolfo, S. Intrusion detection with unlabeled data using clustering. In Proceedings of ACM CSS Workshop on Data Mining Applied to Security DMSA-2001.

Wei, L. &Jiulun, F. A Novel Clustering-based Intrusion Detection Method, Computer Engineering, (2006), 32(7), 149-153.

Ranjan, R. &Sahoo, G. A New Clustering Approach for Anomaly Intrusion Detection. Int J Data Min Knowl Manage Process, (2014), 4(2), 29-38.
http://dx.doi.org/10.5121/ijdkp.2014.4203

Chen, S., Xu, Z. and Tang, Y. A hybrid clustering algorithm based on fuzzy c-means and improved particle swarm optimization. Arab J SciEng, (2014), 39(12), 8875-8887.
http://dx.doi.org/10.1007/s13369-014-1424-9

Demidova, L., Sokolova, Y., Nikulchev, E., Use of Fuzzy Clustering Algorithms Ensemble for SVM Classifier Development, (2015) International Review on Modelling and Simulations (IREMOS), 8 (4), pp. 446-457.
http://dx.doi.org/10.15866/iremos.v8i4.6825

Shankar, T., Shanmugavel, S., Karthikeyan, A., Hybrid Approach for Energy Optimization in Wireless Sensor Networks Using PSO, (2013) International Journal on Communications Antenna and Propagation (IRECAP), 3 (4), pp. 221-226.

Xiaowei, W., Tao, Z., Shu, T., A Novel Fault Section Location Method Based on Energy Spectrum Entropy of EMD and Fuzzy C-Means Algorithm for Small Current to Ground System, (2013) International Review of Electrical Engineering (IREE), 8 (6), pp. 1823-1832.

Mubarak, T., Appa Rao, G., Sattar, S., Sajitha, M., Efficient Intrusion Detection Ensuring Connectivity in 2D and 3D WSN, (2014) International Review on Computers and Software (IRECOS), 9 (2), pp. 219-229.

Mohamed Mubarak, T., Sajitha, M., Appa Rao, G., Sattar, S., Secure and Energy Efficient Intrusion Detection in 3D WSN, (2014) International Journal on Information Technology (IREIT), 2 (2), pp. 48-55.

Aljabr, M., Using Classification Algorithms in Building Models for Network Intrusion Detection, (2015) International Journal on Numerical and Analytical Methods in Engineering (IRENA), 3 (3), pp. 57-62.

Enshaei, M., Mohd Hanapi, Z., Othman, M., A Review: Mobile Ad Hoc Networks Challenges, Attacks, Security, Vulnerability and Routing Protocols, (2014) International Journal on Communications Antenna and Propagation (IRECAP), 4 (5), pp. 168-179.
http://dx.doi.org/10.15866/irecap.v4i5.3001


Refbacks

  • There are currently no refbacks.



Please send any question about this web site to info@praiseworthyprize.com
Copyright © 2005-2024 Praise Worthy Prize