{"title":"网络入侵检测中的模糊矢量量化","authors":"D. Tran, Wanli Ma, D. Sharma, Thien Huu Nguyen","doi":"10.1109/GrC.2007.124","DOIUrl":null,"url":null,"abstract":"This paper considers anomaly network traffic detection using different network feature subsets. Fuzzy c-means vector quantization is used to train network attack models and the minimum distortion rule is applied to detect network attacks. We also demonstrate the effectiveness and ineffectiveness in finding anomalies by looking at the network data alone. Experiments performed on the KDD CUP 1999 dataset show that time based traffic features in the last two second time window should be selected to obtain highest detection rates.","PeriodicalId":259430,"journal":{"name":"2007 IEEE International Conference on Granular Computing (GRC 2007)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2007-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"27","resultStr":"{\"title\":\"Fuzzy Vector Quantization for Network Intrusion Detection\",\"authors\":\"D. Tran, Wanli Ma, D. Sharma, Thien Huu Nguyen\",\"doi\":\"10.1109/GrC.2007.124\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper considers anomaly network traffic detection using different network feature subsets. Fuzzy c-means vector quantization is used to train network attack models and the minimum distortion rule is applied to detect network attacks. We also demonstrate the effectiveness and ineffectiveness in finding anomalies by looking at the network data alone. Experiments performed on the KDD CUP 1999 dataset show that time based traffic features in the last two second time window should be selected to obtain highest detection rates.\",\"PeriodicalId\":259430,\"journal\":{\"name\":\"2007 IEEE International Conference on Granular Computing (GRC 2007)\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2007-11-02\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"27\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2007 IEEE International Conference on Granular Computing (GRC 2007)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/GrC.2007.124\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2007 IEEE International Conference on Granular Computing (GRC 2007)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/GrC.2007.124","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 27
摘要
本文考虑使用不同的网络特征子集来检测异常网络流量。利用模糊c均值矢量量化训练网络攻击模型,利用最小失真规则检测网络攻击。我们还演示了通过单独查看网络数据来发现异常的有效性和无效性。在KDD CUP 1999数据集上进行的实验表明,为了获得最高的检测率,应该选择最后两秒时间窗的基于时间的交通特征。
Fuzzy Vector Quantization for Network Intrusion Detection
This paper considers anomaly network traffic detection using different network feature subsets. Fuzzy c-means vector quantization is used to train network attack models and the minimum distortion rule is applied to detect network attacks. We also demonstrate the effectiveness and ineffectiveness in finding anomalies by looking at the network data alone. Experiments performed on the KDD CUP 1999 dataset show that time based traffic features in the last two second time window should be selected to obtain highest detection rates.