A FDRS-Based Data Classification Method Used for Abnormal Network Intrusion Detection

The data mining techniques used for extracting patterns that represent abnormal network behavior for intrusion detection is an important research area in network security.Based on the new proposed theoretical model of recognition space and further division method, this paper introduces a novel improvement of neural network classification: further division of recognition space(FDRS).Then studied the method to classify samples by mapping what to further divided recognition space.The proposed approach was applied to an intrusion detection system (IDS) with 41 inputs (features). Experimental results show that the proposed method was efficient in data classification and suitable for abnormal detection using network processor-based platforms.

[1]  Andrzej Skowron,et al.  A rough set approach to knowledge discovery , 2002, International Journal of Intelligent Systems.

[2]  Barry Webster,et al.  A Local Search Optimization Algorithm Based on Natural Principles of Gravitation , 2003, IKE.

[3]  Yuehui Chen,et al.  A Novel Classification Method Based on Data Gravitation , 2005, 2005 International Conference on Neural Networks and Brain.

[4]  You Chung Chung,et al.  Optimization of a buried microstrip antenna for simultaneous communication and sensing of soil moisture , 2006, IEEE Transactions on Antennas and Propagation.

[5]  Dimitrios Gunopulos,et al.  Automatic subspace clustering of high dimensional data for data mining applications , 1998, SIGMOD '98.

[6]  Vladimir N. Vapnik,et al.  The Nature of Statistical Learning Theory , 2000, Statistics for Engineering and Information Science.

[7]  Kate A. Smith Soft Computing in Communications , 2005, IEEE Transactions on Neural Networks.

[8]  J. MacQueen Some methods for classification and analysis of multivariate observations , 1967 .

[9]  Russell C. Eberhart,et al.  A new optimizer using particle swarm theory , 1995, MHS'95. Proceedings of the Sixth International Symposium on Micro Machine and Human Science.

[10]  Yoav Freund,et al.  Boosting a weak learning algorithm by majority , 1995, COLT '90.

[11]  William L. Fithen,et al.  State of the Practice of Intrusion Detection Technologies , 2000 .

[12]  Xiaohua Hu,et al.  Using rough sets theory and database operations to construct a good ensemble of classifiers for data mining applications , 2001, Proceedings 2001 IEEE International Conference on Data Mining.

[13]  Yuehui Chen,et al.  Feature Selection and Intrusion Detection Using Hybrid Flexible Neural Tree , 2005, ISNN.

[14]  Yong Wang,et al.  Network Connection Based Intrusion detection Using Rough Set Classification , 2006, 2006 International Conference on Communications, Circuits and Systems.

[15]  Janusz Zalewski,et al.  Rough sets: Theoretical aspects of reasoning about data , 1996 .

[16]  Hongjun Lu,et al.  Effective Data Mining Using Neural Networks , 1996, IEEE Trans. Knowl. Data Eng..

[17]  Marta Indulska,et al.  Gravity based spatial clustering , 2002, GIS '02.

[18]  Sonajharia Minz,et al.  Hybridized Rough Set Framework for Classification: An Experimental View , 2003, HIS.

[19]  Yong Shi,et al.  A Shrinking-Based Approach for Multi-Dimensional Data Analysis , 2003, VLDB.

[20]  Takashi Matsuhisa Bayesian Communication under Rough Sets Information , 2006, 2006 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology Workshops.

[21]  Yong Shi,et al.  A shrinking-based dimension reduction approach for multi-dimensional analysis , 2004, Proceedings. 16th International Conference on Scientific and Statistical Database Management, 2004..

[22]  Sonajharia Minz,et al.  Rough Set Based Decision Tree Model for Classification , 2003, DaWaK.

[23]  Lipo Wang,et al.  A gradual noisy chaotic neural network for solving the broadcast scheduling problem in packet radio networks , 2006, IEEE Trans. Neural Networks.

[24]  Bernhard E. Boser,et al.  A training algorithm for optimal margin classifiers , 1992, COLT '92.