To detect misuse and anomaly attacks through rule induction analysis and fuzzy methods

dc.contributor.authorWitcha Chimphlee
dc.contributor.authorAbdul Hanan Abdullah
dc.contributor.authorMohd Noor Md. Sap
dc.contributor.authorSiriporn Chimphlee
dc.contributor.authorSurat Srinoy
dc.contributor.correspondenceW. Chimphlee; Faculty of Science and Technology, Suan Dusit Rajabhat University, Dusit, Bangkok, 295 Rajasrima Road, Thailand; email: witcha_chi@dusit.ac.th
dc.date.accessioned2025-03-10T07:38:08Z
dc.date.available2025-03-10T07:38:08Z
dc.date.issued2006
dc.description.abstractTo protect networks, intrusion detection systems aim to identify attacks with a high detection rate and a low false alarm rate. In this paper we propose an intrusion detection method that combines rule induction analysis for misuse detection and Fuzzy c-means for anomaly detection. Rule induction is used to generate patterns from data and finding a set of rules that satisfy some predefined criteria. Fuzzy c-Means allow objects to belong to several clusters simultaneously, with different degrees of membership. Our method is an accurate model for handle complex attack patterns in large networks. Empirical studies using the network security data set from the DARPA 1998 offline intrusion detection project (KDD 1999 Cup) show the feasibility of misuse and anomaly detection results.
dc.identifier.citationWSEAS Transactions on Computers
dc.identifier.issn11092750
dc.identifier.scopus2-s2.0-30644474447
dc.identifier.urihttps://repository.dusit.ac.th//handle/123456789/5063
dc.languageEnglish
dc.rights.holderScopus
dc.subjectAnomaly detection
dc.subjectFuzzy c-means
dc.subjectMisuse detection
dc.subjectNetwork intrusion detection
dc.subjectRule induction analysis
dc.titleTo detect misuse and anomaly attacks through rule induction analysis and fuzzy methods
dc.typeArticle
mods.location.urlhttps://www.scopus.com/inward/record.uri?eid=2-s2.0-30644474447&partnerID=40&md5=8a66abf717cfa537a731454b9b2c731e
oaire.citation.endPage54
oaire.citation.issue1
oaire.citation.startPage49
oaire.citation.volume5
Files
Collections