Anomaly Detection in Data Mining using Fuzzy C-Means Technique and Artificial Neural Network

Anomaly detection is the new research topic to this new generation researcher in present time. Anomaly detection is a domain i.e., the key for the upcoming data mining. The term ‘data mining’ is referred for methods and algorithms that allow extracting and analyzing data so that find rules and patterns describing the characteristic properties of the information. Techniques of data mining can be applied to any type of data to learn more about hidden structures and connections. In the present world, vast amounts of data are kept and transported from one location to another. The data when transported or kept is informed exposed to attack. Though many techniques or applications are available to secure data, ambiguities exist. As a result to analyze data and to determine different type of attack data mining techniques have occurred to make it less open to attack. Anomaly detection is used the techniques of data mining to detect the surprising or unexpected behaviour hidden within data growing the chances of being intruded or attacked. This paper work focuses on Anomaly Detection in Data mining. The main goal is to detect the anomaly in time series data using machine learning techniques.

[1]  Lance Sherry,et al.  Anomaly detection in aircraft data using Recurrent Neural Networks (RNN) , 2016, 2016 Integrated Communications Navigation and Surveillance (ICNS).

[2]  Jian Ma,et al.  A new approach to intrusion detection using Artificial Neural Networks and fuzzy clustering , 2010, Expert Syst. Appl..

[3]  Varun Chandola,et al.  TR 09-004 Detecting Anomalies in a Time Series Database , 2009 .

[4]  Bart Baesens,et al.  New Trends in Data Mining , 2005 .

[5]  Santosh Kumar,et al.  Genetic Algorithms in Intrusion Detection Systems: A Survey , 2014 .

[6]  Swati Paliwal,et al.  Denial-of-Service, Probing & Remote to User (R2L) Attack Detection using Genetic Algorithm , 2012 .

[7]  Teh Ying Wah,et al.  Effective Clustering of Time-Series Data Using FCM , 2014 .

[8]  Salvatore J. Stolfo,et al.  JAM: Java Agents for Meta-Learning over Distributed Databases , 1997, KDD.

[9]  Usman Ahmed,et al.  Host based intrusion detection using RBF neural networks , 2009, 2009 International Conference on Emerging Technologies.

[10]  Nuno Constantino Castro,et al.  Time Series Data Mining , 2009, Encyclopedia of Database Systems.

[11]  S. N. Pawar,et al.  Anomaly based IDS using Backpropagation Neural Network , 2016 .

[12]  Itzhak Levin,et al.  KDD-99 classifier learning contest LLSoft's results overview , 2000, SKDD.

[13]  Monica Mehrotra,et al.  Design Network Intrusion Detection System using hybrid Fuzzy-Neural Network , 2010 .

[14]  Marc Dacier,et al.  A revised taxonomy for intrusion-detection systems , 2000, Ann. des Télécommunications.

[15]  Monis Akhlaq,et al.  Snort Performance Evaluation , 2009 .

[16]  Vladimir A. Golovko,et al.  Neural network approach to real-time network intrusion detection and recognition , 2011, Proceedings of the 6th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems.

[17]  Jung-Min Park,et al.  An overview of anomaly detection techniques: Existing solutions and latest technological trends , 2007, Comput. Networks.

[18]  Tetiana Gladkykh,et al.  Fuzzy logic inference for unsupervised anomaly detection , 2016, 2016 IEEE First International Conference on Data Stream Mining & Processing (DSMP).

[19]  M. Mahajan,et al.  Performance Comparison of Fuzzy C Means with Respect to Other Clustering Algorithm , 2014 .

[20]  Witold Pedrycz,et al.  Anomaly detection in time series data using a fuzzy c-means clustering , 2013, 2013 Joint IFSA World Congress and NAFIPS Annual Meeting (IFSA/NAFIPS).

[21]  VARUN CHANDOLA,et al.  Anomaly detection: A survey , 2009, CSUR.

[22]  Ying Wang,et al.  An Anomaly Detection Method Based on Fuzzy C-means Clustering Algorithm , 2010 .

[23]  Limsoon Wong,et al.  DATA MINING TECHNIQUES , 2003 .

[24]  Swain Sunita,et al.  A Hybrid Approach of Intrusion Detection using ANN and FCM , 2016 .

[25]  Zurina Mohd Hanapi,et al.  Hybrid of fuzzy Clustering Neural Network over NSL Dataset for Intrusion Detection System , 2013, J. Comput. Sci..

[26]  Victoria J. Hodge,et al.  A Survey of Outlier Detection Methodologies , 2004, Artificial Intelligence Review.

[27]  Sugata Sanyal,et al.  Adaptive neuro-fuzzy intrusion detection systems , 2004, International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004..

[28]  Asmaa Shaker Ashoor Importance of Intrusion Detection System ( IDS ) , 2010 .

[29]  D. P. Gaikwad,et al.  Anomaly Based Intrusion Detection System Using Artificial Neural Network and Fuzzy Clustering , 2012 .

[30]  Vaishali Kolhe,et al.  Hybrid Approach for Classification using Multilevel Fuzzy Min-Max Neural Network , 2016 .