Fuzzy Kernel k-Medoids algorithm for anomaly detection problems

Intrusion Detection System (IDS) is an essential part of security systems to strengthen the security of information systems. IDS can be used to detect the abuse by intruders who try to get into the network system in order to access and utilize the available data sources in the system. There are two approaches of IDS, Misuse Detection and Anomaly Detection (behavior-based intrusion detection). Fuzzy clustering-based methods have been widely used to solve Anomaly Detection problems. Other than using fuzzy membership concept to determine the object to a cluster, other approaches as in combining fuzzy and possibilistic membership or feature-weighted based methods are also used. We propose Fuzzy Kernel k-Medoids that combining fuzzy and possibilistic membership as a powerful method to solve anomaly detection problem since on numerical experiment it is able to classify IDS benchmark data into five different classes simultaneously. We classify IDS benchmark data KDDCup’99 data set into five different classes sim...

[1]  James C. Bezdek,et al.  Generalized fuzzy c-means clustering strategies using Lp norm distances , 2000, IEEE Trans. Fuzzy Syst..

[2]  James C. Bezdek,et al.  Efficient Implementation of the Fuzzy c-Means Clustering Algorithms , 1986, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[3]  James C. Bezdek,et al.  Pattern Recognition with Fuzzy Objective Function Algorithms , 1981, Advanced Applications in Pattern Recognition.

[4]  Hidetomo Ichihashi,et al.  Linear Fuzzy Clustering With Selection of Variables Using Graded Possibilistic Approach , 2007, IEEE Transactions on Fuzzy Systems.

[5]  James C. Bezdek,et al.  Relational duals of the c-means clustering algorithms , 1989, Pattern Recognit..

[6]  Rui Yan,et al.  Fuzzy C-Means Clustering of Web Users for Educational Sites , 2003, Canadian Conference on AI.

[7]  Jian-Ping Mei,et al.  Fuzzy clustering with weighted medoids for relational data , 2010, Pattern Recognit..

[8]  Nello Cristianini,et al.  An Introduction to Support Vector Machines and Other Kernel-based Learning Methods , 2000 .

[9]  Philip S. Yu,et al.  Top 10 algorithms in data mining , 2007, Knowledge and Information Systems.

[10]  Jun He,et al.  A hybrid artificial immune system and Self Organising Map for network intrusion detection , 2008, Inf. Sci..

[11]  Jerzy Neyman,et al.  PROCEEDINGS OF THE BERKELEY SYMPOSIUM ON MATHEMATICAL STATISTICS AND PROBABILITY (5TH) HELD JUNE 21-JULY 18, 1965, AND DECEMBER 27, 1965-JANUARY 7, 1966. VOLUME I. THEORY OF STATISTICS. , 1950 .

[12]  Arputharaj Kannan,et al.  A Novel Weighted Fuzzy C –Means Clustering Based on Immune Genetic Algorithm for Intrusion Detection , 2012 .

[13]  Nicolas Labroche,et al.  Online fuzzy medoid based clustering algorithms , 2014, Neurocomputing.

[14]  Bernhard Schölkopf,et al.  Nonlinear Component Analysis as a Kernel Eigenvalue Problem , 1998, Neural Computation.

[15]  Ajith Abraham,et al.  Fuzzy C-means and fuzzy swarm for fuzzy clustering problem , 2011, Expert Syst. Appl..

[16]  J. C. Dunn,et al.  A Fuzzy Relative of the ISODATA Process and Its Use in Detecting Compact Well-Separated Clusters , 1973 .

[17]  James C. Bezdek,et al.  Fuzzy c-means clustering of incomplete data , 2001, IEEE Trans. Syst. Man Cybern. Part B.

[18]  James C. Bezdek,et al.  An integrated approach to fuzzy learning vector quantization and fuzzy c-means clustering , 1997, IEEE Trans. Fuzzy Syst..