Skip to main content

Improving Detection Rate in Intrusion Detection Systems Using FCM Clustering to Select Meaningful Landmarks in Incremental Landmark Isomap Algorithm

  • Conference paper

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 164))

Abstract

Dimension reduction is crucial when it is applied on intrusion detection systems. Many data mining algorithms have been used for this purpose. For example, manifold learning algorithms, especially Isometric feature mapping (Isomap) have been investigated. Researchers successfully applied Isomap on intrusion detection system as a nonlinear dimension reduction method. But it had some problems such as operation on batch mode and being disabled to handle new data points, additionally, it had computational cost and could not be properly applied on huge datasets. Losing time and reducing speed of detection is another problem of Isomap in intrusion detection systems. Incremental Landmark Isomap which selects landmarks among whole data points has been invented for solving these problems. In this paper, we use FCM as a data reduction method to select meaningful landmarks for Incremental L-Isomap instead of choosing them randomly. This method is implemented and applied on some UCI datasets and also NSLKDD dataset. The results demonstrate higher detection rate for the proposed method, comparing to classical Incremental L-Isomap which chooses landmarks randomly.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Anderson, J.P.: Computer Security Threat Monitoring and Surveillance, James P. Anderson Co., Fort Washington, PA, Tech. Rep. 79F296400 (1-56) (April 1980)

    Google Scholar 

  2. Ambwani, T.: Multi Class Support Vector Machine Implementation to Intrusion Detection. In: Proc. of the Intl. Joint Conf. on Neural Networks, pp. 2300–2305. IEEE Press, New York (2003)

    Google Scholar 

  3. John, G.H., Kohavi, R., Pfleger, K.: Irrelevant Features and the Subset Selection Problem. In: Proc. of the 11th Int. Conf. on Machine Learning, pp. 121–129. IEEE Press, New York (1994)

    Google Scholar 

  4. Jolliffe, I.T.: Principal Component Analysis. Springer, New York (1986)

    Book  MATH  Google Scholar 

  5. Cox, T.F., Cox, M.A.A.: Multidimensional Scaling. Chapman &Hall, London (1994)

    MATH  Google Scholar 

  6. Roweis, S.T., Saul, L.K.: Nonlinear Dimensionality Reduction by Locally Linear Embedding. Science 290, 2323–2326 (2000)

    Article  Google Scholar 

  7. Tenenbaum, J.B., de Silva, V., Langford, J.C.: A Global Geometric Framework for Nonlinear Dimensionality Reduction. Science 290, 2319–2323 (2000)

    Article  Google Scholar 

  8. De Silva, V., Tenenbaum, J.B.: Global Versus Local Methods in Nonlinear Dimensionality Reduction. In: Advances in Neural Information Processing Systems, vol. 15, pp. 705–712. MIT Press, Cambridge (2003)

    Google Scholar 

  9. Law, M., Zhang, N., Jain, A.: Nonlinear manifold learning for data stream. In: Berry, M., Dayal, U., Kamath, C., Skillicorn, D. (eds.) Proc. of the 4th SIAM International Conference on Data Mining, Lake Buena Vista, Florida, USA, pp. 33–44 (2004)

    Google Scholar 

  10. Bezdek, J.: Pattern Recognition with Fuzzy Objective Function Algorithms. Plenum Press, NY (1981)

    Book  MATH  Google Scholar 

  11. Mahbod, T., Ebrahim, B., Wei, L., Ali, A.G.: A Detailed Analysis of the KDD CUP 99 Data Set. In: Proceeding of Computational Intelligence in Security and Defense Application, CISDA 2009 (2009)

    Google Scholar 

  12. McHugh, J.: Testing intrusion detection systems: a critique of the 1998 and 1999 darpa intrusion detection system evaluations as performed by lincoln laboratory. ACM Transactions on Information and System Security 3, 262–294 (1998)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Iranmanesh, S.M., Mohammadi, M., Akbari, A., Nassersharif, B. (2011). Improving Detection Rate in Intrusion Detection Systems Using FCM Clustering to Select Meaningful Landmarks in Incremental Landmark Isomap Algorithm. In: Zhou, Q. (eds) Theoretical and Mathematical Foundations of Computer Science. ICTMF 2011. Communications in Computer and Information Science, vol 164. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-24999-0_7

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-24999-0_7

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-24998-3

  • Online ISBN: 978-3-642-24999-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics