A clustering algorithm for intrusion detection

In this paper, we introduce a new clustering algorithm, FCC, for intrusion detection based on the concept of fuzzy connectedness. This concept was introduced by Rosenfeld in 1979 and used with success in image segmentation; here we extend this approach to clustering and demonstrate its effectiveness in intrusion detection. Starting with a single or a few seed points in each cluster, all the data points are dynamically assigned to the cluster that has the highest fuzzy connectedness value (strongest connection). With an efficient heuristic algorithm, the time complexity of the clustering process is O(NlogN), where N is the number of data points. The value of fuzzy connectedness is calculated using both the Euclidean distance and the statistical properties of clusters. This unsupervised learning method allows the discovery of clusters of any shape. Application of the method in intrusion detection demonstrates that it can detect not only known intrusion types, but also their variants. Experimental results on the KDD-99 intrusion detection data set show the efficiency and accuracy of this method. A detection rate above 94% and a false alarm rate below 4% are achieved, outperforming major competitors by at least 5%.

[1]  Ali A. Ghorbani,et al.  Y-means: a clustering method for intrusion detection , 2003, CCECE 2003 - Canadian Conference on Electrical and Computer Engineering. Toward a Caring and Humane Technology (Cat. No.03CH37436).

[2]  Wang Hongzhi,et al.  Data mining for intrusion detection , 2001, 2001 International Conferences on Info-Tech and Info-Net. Proceedings (Cat. No.01EX479).

[3]  Leonid Portnoy,et al.  Intrusion detection with unlabeled data using clustering , 2000 .

[4]  Risto Miikkulainen,et al.  Intrusion Detection with Neural Networks , 1997, NIPS.

[5]  Xiangyang Li,et al.  Decision Tree Classifiers for Computer Intrusion Detection , 2001, Scalable Comput. Pract. Exp..

[6]  Supun Samarasekera,et al.  Fuzzy Connectedness and Object Definition: Theory, Algorithms, and Applications in Image Segmentation , 1996, CVGIP Graph. Model. Image Process..

[7]  Peter Mell,et al.  Intrusion Detection Systems , 2001 .

[8]  Azriel Rosenfeld,et al.  Fuzzy Digital Topology , 1979, Inf. Control..

[9]  Bruno M. Carvalho,et al.  Multiseeded Segmentation Using Fuzzy Connectedness , 2001, IEEE Trans. Pattern Anal. Mach. Intell..