Surat Srinoy2025-03-102025-03-1020062006 International Symposium on Communications and Information Technologies, ISCIT10.1109/ISCIT.2006.3400172-s2.0-50949085026https://repository.dusit.ac.th//handle/123456789/5065Intrusion detection system looks for unusual or suspicious activity, such as patterns of network traffics that are likely indicators of unauthorized activity. New intrusion types, of which detection systems are unaware, are the most difficult to detect. The amount of available network audit data instances is usually large, human labeling is tedious, time-consuming, and expensive. In this paper we present support vector machine approach to data clustering. Support vector machine is used to initially create raw clusters and then these clusters are refined using Artificial Fuzzy Ants Clustering (AFAC). AFAC that has been developed as swarm intelligence techniques. The Algorithm uses ant colony optimization principle to find good partitions of the data. Certain unnecessary complications of the original algorithm are discussed and means of overcoming these complexities are proposed. We propose Artificial Fuzzy Ants Clustering (AFAC) in the second stage for refinement mean of overcoming these complexities are proposed. Our approach allows us to recognize not only known attacks but also to detect suspicious activity that may be the result of a new, unknown attack. The experimental results on Knowledge Discovery and Data Mining-(KDDCup 1999). © 2006 IEEE.An adaptive IDS model based on swarm intelligence and support vector machineConference paperScopus