Affiliation:
1. Computer engineering department Sirjan, Iran
Abstract
Today detection of new threats has become a need for secured communication to provide complete data confidentiality, integrity and availability. Design and development of such an intrusion detection system in the communication world, should not only be new, accurate and fast but also effective in an environment encompassing the surrounding network. In this paper, a new approach is proposed for network anomaly detection by combining neural network and clustering algorithms. We propose a modified Self Organizing Map algorithm which initially starts with null network and grows with the original data space as initial weight vector, updating neighborhood rules and learning rate dynamically in order to overcome the fixed architecture and random weight vector assignment of simple SOM. New nodes are created using distance threshold parameter and their neighborhood is identified using connection strength and its learning rule and the weight vector updating is carried out for neighborhood nodes. The Fuzzy k-means clustering algorithm is employed for grouping similar nodes of Modified SOM into k clusters using similarity measures. Performance of the new approach is evaluated with standard bench mark dataset. The new approach is evaluated using performance metrics such as detection rate and false alarm rate. The result is compared with other individual neural network methods, which shows considerable increase in the detection rate and 1.5% false alarm rate.
Publisher
North Atlantic University Union (NAUN)
Subject
Applied Mathematics,Computational Theory and Mathematics,Modeling and Simulation
Reference20 articles.
1. Adebayo O. Adetunmbi, Samuel O. Falaki, Olumide S. Adewale and Boniface K., (2008), “Network Intrusion Detection based on Rough Set and k-Nearest Neighbour”, International J ournal of Computing and ICT Research, Vol. 2(1), pp. 60 - 66.
2. Alahakoon, D., Halgamuge, S. K., &Srinivasan, B., (2000), “ Dynamic self-organizing maps withcontrolled growth for knowledge discovery”, IEEE Transactions on Neural Networks, vol. 11(3), pp.601–614.
3. Bose. S, Aneetha . A.S, Revathi. S, (2012), “Dynamic network anomaly intrusion detection system using modified SOM”, Proceedings of Second International Conference of Computer science and Engineering - 2012, New Delhi, pp. 27 - 34.
4. Da Deng &Nikola Kasabov. N, (2003), “Online pattern analysis by evolving self-organizing maps”, Elsevier, Journal of Neuro computing, vol. 51, pp. 87–103.
5. Jiawei Han and Micheline Kamber, (2003), “Data Mining Concepts and Techniques”, Morgan Kaufmann Publishers.