An unsupervised anomaly detection approach using subtractive clustering and Hidden Markov Model

被引:0
|
作者
Yang, Chun [1 ]
Deng, Feiqi [1 ]
Yang, Haidong [1 ]
机构
[1] S China Univ Technol, Coll Automat Sci & Engn, Guangzhou 510640, Guangdong, Peoples R China
关键词
subtractive clustering; Hidden Markov Model; feature selection; intrusion detection;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Previous Research in network intrusion detection system (NIDS) has typically used misuse detection or supervised anomaly detection techniques. These techniques have difficulty in detecting new types of attacks or causing high false positives in real network environment. Unsupervised anomaly detection can overcome the drawbacks of misuse detection and supervised anomaly detection. In this paper, normal-anomaly patterns are built over the network traffic dataset that uses subtractive clustering, and at the same time the built Hidden Markov Model (HMM) correlates the observation sequences and state transitions to predict the most probable intrusion state sequences. The proposed unsupervised anomaly detection approach is capable of reducing false positives by classifying intrusion sequences into different emergency levels. The experimental results are also reported using the KDDCup'99 dataset and Matlab.
引用
收藏
页码:123 / 126
页数:4
相关论文
共 50 条
  • [41] An anomaly intrusion detection Based on Hidden Markov model System Call Sequenc
    Wang, Dongliang
    Wang, Zhigang
    ADVANCED RESEARCH ON AUTOMATION, COMMUNICATION, ARCHITECTONICS AND MATERIALS, PTS 1 AND 2, 2011, 225-226 (1-2): : 609 - +
  • [42] Statistical Anomaly Detection in Human Dynamics Monitoring Using a Hierarchical Dirichlet Process Hidden Markov Model
    Fuse, Takashi
    Kamiya, Keita
    IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2017, 18 (11) : 3083 - 3092
  • [43] Malware Detection in Smartphone Using Hidden Markov Model
    Xin, Kejun
    Li, Gang
    Qin, Zhongyuan
    Zhang, Qunfang
    2012 FOURTH INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY (MINES 2012), 2012, : 857 - 860
  • [44] Audio noise detection using hidden Markov model
    Sabri, M
    Alirezaie, J
    Krishnan, S
    PROCEEDINGS OF THE 2003 IEEE WORKSHOP ON STATISTICAL SIGNAL PROCESSING, 2003, : 637 - 640
  • [45] Detection of Fast Ripples Using Hidden Markov Model
    Nazarimehr, F.
    Montazeri, N.
    Shamsollahi, M. B.
    Kachenoura, A.
    Wendling, F.
    2014 21TH IRANIAN CONFERENCE ON BIOMEDICAL ENGINEERING (ICBME), 2014, : 348 - 352
  • [46] Combining Hidden Markov Models for Improved Anomaly Detection
    Khreich, Wael
    Granger, Eric
    Sabourin, Robert
    Miri, Ali
    2009 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-8, 2009, : 965 - +
  • [47] Efficient modeling of discrete events for anomaly detection using hidden Markov models
    Florez-Larrahondo, G
    Bridges, SM
    Vaughn, R
    INFORMATION SECURITY, PROCEEDINGS, 2005, 3650 : 506 - 514
  • [48] An Evolutionary Feature Clustering Approach for Anomaly Detection Using Improved Fuzzy Membership Function: Feature Clustering Approach for Anomaly Detection
    Kumar, Gunupudi Rajesh
    Gugulothu, Narsimha
    Nimmala, Mangathayaru
    INTERNATIONAL JOURNAL OF INFORMATION TECHNOLOGY AND WEB ENGINEERING, 2019, 14 (04) : 19 - 49
  • [49] Network Anomaly Detection Using Unsupervised Feature Selection and Density Peak Clustering
    Ni, Xiejun
    He, Daojing
    Chan, Sammy
    Ahmad, Farooq
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, ACNS 2016, 2016, 9696 : 212 - 227
  • [50] Feature learning for a hidden Markov model approach to landmine detection
    Zhang, Xuping
    Gader, Paul
    Frigui, Hichem
    DETECTION AND REMEDIATION TECHNOLOGIES FOR MINES AND MINELIKE TARGETS XII, 2007, 6553