Đang chuẩn bị liên kết để tải về tài liệu:
Fuzzy clustering as an intrusion detection technique
Đang chuẩn bị nút TẢI XUỐNG, xin hãy chờ
Tải xuống
The main aim of this paper is to use Fuzzy cmedoids algorithm to intrusion detection. The beginning section of the paper deals with introduction to clustering in the field of intrusion detection while the later section defines how fuzzy k-medoids algorithm performs better than fuzzy c-means algorithm. | Disha Sharma et al, International Journal of Computer Science & Communication Networks,Vol 1(1),September-October 2011 Fuzzy Clustering as an Intrusion Detection Technique Disha Sharma Research Scholar dishasharma210@gmail.com Abstract Intrusion detection and clustering have always been hot topics in the field of machine learning. Clustering as an intrusion detection technique has long before proved to be beneficial. But as the methods and types of attacks are changing, there is an ongoing need to develop more and more better techniques that can fight back. The main aim of this paper is to use Fuzzy cmedoids algorithm to intrusion detection. The beginning section of the paper deals with introduction to clustering in the field of intrusion detection while the later section defines how fuzzy k-medoids algorithm performs better than fuzzy c-means algorithm. 1. Intrusion Detection All Any attempt to compromise the integrity, confidentiality or availability of a resource is called an intrusion. A wide range of activities fall under this definition. Added security measure can stop all such attacks. The goal of intrusion detection is to build a system which would automatically scan network activity and detect such attacks. Once an attack is detected, the system administrator could be informed and thus take corrective action. Generally, there are four categories of attacks [1]. They are: 1. DoS (Denial of Service) – trying to prevent a legitimate user from accessing the service in the target machine. 2. Probe – scanning a target machine for information about potential vulnerabilities. 3. R2L (Remote to Local) – when attacker attempts to obtain non-authorized access into a machine or network. 4. U2R (User to Root) – when target machine is already invaded, but the attacker attempts to gain access with super-user privileges. Available online @ www.ijcscn.com The rapid proliferation of computer networks has changed the prospects of network security. This generated