Min-max hyperellipsoidal clustering for anomaly detection in network security

Suseela T. Sarasamma, Qiuming A. Zhu

Research output: Contribution to journalArticlepeer-review

25 Scopus citations

Abstract

A novel hyperellipsoidal clustering technique is presented for an intrusion-detection system in network security. Hyperellipsoidal clusters toward maximum intracluster similarity and minimum intercluster similarity are generated from training data sets. The novelty of the technique lies in the fact that the parameters needed to construct higher order data models in general multivariate Gaussian functions are incrementally derived from the data sets using accretive processes. The technique is implemented in a feedforward neural network that uses a Gaussian radial basis function as the model generator. An evaluation based on the inclusiveness and exclusiveness of samples with respect to specific criteria is applied to accretively learn the output clusters of the neural network. One significant advantage of this is its ability to detect individual anomaly types that are hard to detect with other anomaly-detection schemes. Applying this technique, several feature subsets of the tcptrace network-connection records that give above 95% detection at false-positive rates below 5% were identified.

Original languageEnglish (US)
Pages (from-to)887-901
Number of pages15
JournalIEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics
Volume36
Issue number4
DOIs
StatePublished - Aug 2006

Keywords

  • Accretive construction
  • Anomaly detection
  • Confidence measurement
  • Hyperellipsoidal clustering
  • Neural networks
  • Self-organizing map (SOM)

ASJC Scopus subject areas

  • Control and Systems Engineering
  • Software
  • Information Systems
  • Human-Computer Interaction
  • Computer Science Applications
  • Electrical and Electronic Engineering

Fingerprint

Dive into the research topics of 'Min-max hyperellipsoidal clustering for anomaly detection in network security'. Together they form a unique fingerprint.

Cite this