To identify suspicious activity in anomaly detection based on soft computing

dc.contributor.authorWitcha Chimphlee
dc.contributor.authorMohd Noor Md Sap
dc.contributor.authorAbdul Hanan Abdullah
dc.contributor.authorSiriporn Chimphlee
dc.contributor.authorSurat Srinoy
dc.contributor.correspondenceW. Chimphlee; Faculty of Science and Technology, Suan Dusit Rajabhat University, Dusit, Bangkok, 295 Rajasrima Road, Thailand; email: witcha_chi@dusit.ac.th
dc.date.accessioned2025-03-10T07:38:08Z
dc.date.available2025-03-10T07:38:08Z
dc.date.issued2006
dc.description.abstractThe Traditional intrusion detection systems (IDS) look for unusual or suspicious activity, such as patterns of network traffic that are likely indicators of unauthorized activity. However, normal operation often produces traffic that matches likely "attack signature", resulting in false alarms. In this paper we propose an intrusion detection method that proposes rough set based feature selection heuristics and using fuzzy c-means for clustering data. Rough set has to decrease the amount of data and get rid of redundancy. Fuzzy Clustering methods allow objects to belong to several clusters simultaneously, with different degrees of membership. Our approach allows us to recognize not only known attacks but also to increase accuracy detection rate for suspicious activity and signature detection. Empirical studies using the network security data set from the DARPA 1998 offline intrusion detection project (KDD 1999 Cup) show the feasibility of misuse and anomaly detection results.
dc.identifier.citationProceedings of the IASTED International Conference on Artificial Intelligence and Applications, AIA 2006
dc.identifier.scopus2-s2.0-38049121550
dc.identifier.urihttps://repository.dusit.ac.th//handle/123456789/5070
dc.languageEnglish
dc.rights.holderScopus
dc.subjectAnomaly detection
dc.subjectFuzzy c-means
dc.subjectIntrusion detection
dc.subjectNetwork security
dc.subjectRough set
dc.subjectSuspicious activity
dc.titleTo identify suspicious activity in anomaly detection based on soft computing
dc.typeConference paper
mods.location.urlhttps://www.scopus.com/inward/record.uri?eid=2-s2.0-38049121550&partnerID=40&md5=5e96de70cab75a2674d9953618e6b6b9
oaire.citation.endPage364
oaire.citation.startPage359
Files
Collections