DOI QR코드

DOI QR Code

A Systematic Approach to Improve Fuzzy C-Mean Method based on Genetic Algorithm

  • 투고 : 2013.06.21
  • 심사 : 2013.09.12
  • 발행 : 2013.09.25

초록

As computer technology continues to develop, computer networks are now widely used. As a result, there are many new intrusion types appearing and information security is becoming increasingly important. Although there are many kinds of intrusion detection systems deployed to protect our modern networks, we are constantly hearing reports of hackers causing major disruptions. Since existing technologies all have some disadvantages, we utilize algorithms, such as the fuzzy C-means (FCM) and the support vector machine (SVM) algorithms to improve these technologies. Using these two algorithms alone has some disadvantages leading to a low classification accuracy rate. In the case of FCM, self-adaptability is weak, and the algorithm is sensitive to the initial value, vulnerable to the impact of noise and isolated points, and can easily converge to local extrema among other defects. These weaknesses may yield an unsatisfactory detection result with a low detection rate. We use a genetic algorithm (GA) to help resolve these problems. Our experimental results show that the combined GA and FCM algorithm's accuracy rate is approximately 30% higher than that of the standard FCM thereby demonstrating that our approach is substantially more effective.

키워드

참고문헌

  1. L. Protnoy, E, Eskin, and S. Stolfo, "Intrusion detection with unlabeled data using clustering," in Proceedings of ACM CSS Workshop on Data Mining Applied to Security, pp. 1-14, 2001.
  2. KDD cup 1999 data, Available http://kdd.ics.uci.edu/ databases/kddcup99/kddcup99.html
  3. Y. Liu, Z. Wang, and Y. Feng, "DoS intrusion detection based on incremental learning with support vector machines," Computer Engineering, vol. 32, no. 4, pp. 179- 186, 2006.
  4. M. P. O'Mahony, N. J. Hurley, and G. C. Silvestre, "Recommender systems: attack types and strategies," in Proceedings of the 20th National Conference on Artificial Intelligence (AAAI-05), Pittsburgh, PA, 2005, pp. 334- 339.
  5. M. Sabhnani and G. Serpen, "KDD feature set complaint heuristic rules for R2L attack detection," in Security and Management, H. R. Arabnia and Y Mun, Eds. Lasvegas: CSREA Press, 2003, pp. 310-316.
  6. M. Birker-Robaczewska, C. Boukhadra, R. Studer, C. Mueller, C. Binkert, and O. Nayler, "The expression of urotensin II receptor (U2R) is up-regulated by interferongamma," Journal of Receptors and Signal Transduction, vol. 23, no. 4, pp. 289-305, 2003. https://doi.org/10.1081/RRS-120026972
  7. I. T. Jolliffe. Principal Component Analysis, 2nd ed., New York: Springer, 2002.
  8. J. H. Min and F. C. H. Rhee, "An interval type-2 fuzzy PCM algorithm for pattern recognition," Journal of The Korean Institute of Intelligent Systems, vol. 19, no. 1, pp. 102-107, 2009. https://doi.org/10.5391/JKIIS.2009.19.1.102
  9. B. Y. Kang and D. W. Kim, "VS-FCM: validity-guided spatial fuzzy C-means clustering for image segmentation," International Journal of Fuzzy Logic and Intelligent Systems, vol. 10, no. 1, pp. 89-93, Mar. 2010. http://dx.doi.org/10.5391/IJFIS.2010.10.1.089
  10. J. C. Bezdek, Pattern Recognition with Fuzzy Objective Function Algorithms, New York: Plenum Press, 1983.
  11. D. H. Park, S. Ryu, P. H. Jeong, and S. K. Lee, "Application of similarity measure for fuzzy C-means clustering to power system management," International Journal of Fuzzy Logic and Intelligent Systems, vol. 8, no. 1, pp. 18-23,Mar. 2008. https://doi.org/10.5391/IJFIS.2008.8.1.018
  12. R. Nock and F. Nielsen, "On weighting clustering," IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 28, no. 8, pp. 1223-1235, Aug. 2006. http: //dx.doi.org/10.1109/TPAMI.2006.168
  13. G. Hamerly and C. Elkan, "Alternatives to the k-means algorithm that find better clusterings," in Proceedings of the 11th International Conference on Information and Knowledge Management, New York, 2002, pp. 600-607. http://dx.doi.org/10.1145/584792.584890
  14. H. T. Kim, J. H. Lee, and C. W. Ahn, "A recommender system based on interactive evolutionary computation with data grouping," Procedia Computer Science, vol. 3, pp. 611-616, 2011. http://dx.doi.org/10.1016/j.procs.2010.12. 102
  15. W. Li, "Using Genetic Algorithm for network intrusion detection," in Proceedings of the United States Department of Energy Cyber Security Group 2004 Training Conference, Kansas, 2004, pp. 24-27.
  16. D. Beasley, D. R. Bull, and R. R. Martin, "An overview of genetic algorithms: part 1. fundamentals," University Computing, vol. 15, no. 2, pp. 58-69, 1993.
  17. M. Srinivas and L. M. Patnaik, "Adaptive probabilities of crossover and mutation in genetic algorithms," IEEE Transactions on Systems, Man and Cybernetics, vol. 24, no. 4, pp. 656-667, Apr. 1994. http://dx.doi.org/10.1109/ 21.286385
  18. J. H. Min and F. C. H. Rhee, "An interval type-2 fuzzy PCM algorithm for pattern recognition," Journal of The Korean Institute of Intelligent Systems, vol. 19, no. 1, pp. 102-107, Feb. 2009. http://dx.doi.org/10.5391/JKIIS.2009. 19.1.102
  19. H. C. Jeong, S. T. Seo, I. K. Lee, and S. H. Kwon, "Clustering method for reduction of cluster center distortion," Journal of The Korean Institute of Intelligent Systems, vol. 18, no. 3, pp. 354-359, Jun. 2008. http: //dx.doi.org/10.5391/JKIIS.2008.18.3.354
  20. J. W. Han, S. H. Jun, and K. W. Oh, "Cluster merging using enhanced density based fuzzy C-means clustering algorithm," Journal of The Korean Institute of Intelligent Systems, vol. 14, no. 5, pp. 517-524, Aug. 2004. http: //dx.doi.org/10.5391/JKIIS.2004.14.5.517