Anomaly detection using DSNS and Firefly Harmonic Clustering Algorithm

The networks are becoming an essential part of society life and anomalies may represent a loss in network performance. Modeling the traffic behavior pattern is possible to predict the behavior expected and characterize an anomaly. We proposed a hybrid clustering algorithm, Firefly Harmonic Clustering Algorithm (FHCA), for network volume anomaly detection by the combined forces of the algorithms K-Harmonic means (KHM) and Firefly Algorithm (FA). Processing the Digital Signature of Network Segment (DSNS) data and real traffic data, it is possible to detect and point intervals considered anomalous with a trade-off between the 80% true-positive rate and 20% false-positive rate.

[1]  Min Zhang,et al.  Speaker Recognition Based on Support Vector Machines and Multi-Scale Wavelet Analysis , 2009, 2009 International Symposium on Computer Network and Multimedia Technology.

[2]  Umeshwar Dayal,et al.  K-Harmonic Means - A Data Clustering Algorithm , 1999 .

[3]  Tilman Wolf,et al.  AnomBench: A Benchmark for Volume-Based Internet Anomaly Detection , 2009, GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference.

[4]  Sameh Otri,et al.  Data clustering using the bees algorithm , 2007 .

[5]  Joel J. P. C. Rodrigues,et al.  Networking Anomaly Detection Using DSNs and Particle Swarm Optimization with Re-Clustering , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.

[6]  Zülal Güngör,et al.  K-harmonic means data clustering with simulated annealing heuristic , 2007, Appl. Math. Comput..

[7]  Mario Lemes Proença,et al.  Anomaly Detection Aiming Pro-Active Management of Computer Network Based on Digital Signature of Network Segment , 2007, Journal of Network and Systems Management.

[8]  Mohammad Zulkernine,et al.  Anomaly Based Network Intrusion Detection with Unsupervised Outlier Detection , 2006, 2006 IEEE International Conference on Communications.

[9]  Yin Shaohong,et al.  Research and improvement of clustering algorithm in data mining , 2010, 2010 2nd International Conference on Signal Processing Systems.

[10]  Xin-She Yang,et al.  Nature-Inspired Metaheuristic Algorithms , 2008 .

[11]  Mario Lemes Proença,et al.  Baseline to help with network management , 2004, e-Business and Telecommunication Networks.

[12]  Qingbo Yang,et al.  A Survey of Anomaly Detection Methods in Networks , 2009, 2009 International Symposium on Computer Network and Multimedia Technology.

[13]  Jung-Min Park,et al.  An overview of anomaly detection techniques: Existing solutions and latest technological trends , 2007, Comput. Networks.

[14]  Tom Fawcett,et al.  An introduction to ROC analysis , 2006, Pattern Recognit. Lett..

[15]  Tieli Sun,et al.  An efficient hybrid data clustering method based on K-harmonic means and Particle Swarm Optimization , 2009, Expert Syst. Appl..

[16]  Fukuda Kensuke,et al.  A wavelet-based anomaly detection for outbound network traffic , 2010, 8th Asia-Pacific Symposium on Information and Telecommunication Technologies.

[17]  Soheila Dehghanzadeh,et al.  Optimizing Fuzzy K-means for network anomaly detection using PSO , 2008, 2008 IEEE/ACS International Conference on Computer Systems and Applications.

[18]  VARUN CHANDOLA,et al.  Anomaly detection: A survey , 2009, CSUR.