2006 International Conference on Hybrid Information Technology 2006
DOI: 10.1109/ichit.2006.253508
|View full text |Cite
|
Sign up to set email alerts
|

Anomaly-Based Intrusion Detection using Fuzzy Rough Clustering

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
34
0
1

Year Published

2010
2010
2023
2023

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 66 publications
(35 citation statements)
references
References 8 publications
0
34
0
1
Order By: Relevance
“…The methods used in comparison are as follows: K-Means [28], Improved K-Means [28], K-Medoids [28], Expectation Maximization [28], Fuzzy C-Means [6], Fuzzy Rough Clustering [6]. We used accuracy and False positive rate as evaluation metrics.…”
Section: B Performance Comparison With State-of-the-art Methodsmentioning
confidence: 99%
“…The methods used in comparison are as follows: K-Means [28], Improved K-Means [28], K-Medoids [28], Expectation Maximization [28], Fuzzy C-Means [6], Fuzzy Rough Clustering [6]. We used accuracy and False positive rate as evaluation metrics.…”
Section: B Performance Comparison With State-of-the-art Methodsmentioning
confidence: 99%
“…Since malicious behavior is naturally different from normal behavior, abnormal behavior should be considered as outliers [59,60]. Fuzzy logic can help to construct more abstract and flexible patterns for intrusion detection and thus greatly increase the robustness and adaption ability of detection systems [58].…”
Section: Fuzzy Setmentioning
confidence: 99%
“…Hence, outliers should be considered as abnormal behavior. Therefore, the fuzzy C-Medoids algorithm [246] and the fuzzy C-Means algorithm [52,53,54,141] are two common clustering approaches to identify outliers. As all clustering techniques, they are affected by the "curse of dimensionality", thus suffering performance degradation when confronted with datasets of high dimensionality.…”
Section: Fuzzy Anomaly Detectionmentioning
confidence: 99%
“…Feature selection is a necessary data pre-processing step. For example, Principal Component Analysis [141,246] and Rough Sets [52,53,54] can be applied on datasets before being clustered.…”
Section: Fuzzy Anomaly Detectionmentioning
confidence: 99%