SlideShare a Scribd company logo
1 of 9
Download to read offline
Scientific Journal Impact Factor (SJIF): 1.711
International Journal of Modern Trends in Engineering
and Research
www.ijmter.com
@IJMTER-2014, All rights Reserved 89
e-ISSN: 2349-9745
p-ISSN: 2393-8161
DETECTING NETWORK ANOMALIES USING CUSUM and FCM
E.M. Roopa Devi1
, R.C.Suganthe2
, B.Bhuvaneswari3
1,2,3
Department of Information Technology, kongu Engineering College
Abstract - The network intrusion detection techniques are important to prevent our systems and
networks from malicious behaviors. However, traditional network intrusion prevention such as firewalls,
user authentication and data encryption have failed to completely protect networks and systems from the
increasing and sophisticated attacks and malwares. Two anomaly detection techniques – CUSUM and
clustering are used to find network anomalies. CUSUM detect changes based on the cumulative effect of
the changes made in the random sequence instead of using a single threshold to check every variable. It
involves calculating cumulative sum and determining whether a packet is normal or not. The FCM
algorithm employs fuzzy partitioning such that a data point can belong to all groups with different
membership grades. Together, CUSUM and FCM become a good technique in detecting network
anomalies with a very less false alarm rate.
Keywords- Network Security , Intrusion detection system, Feature selection , Data Mining,Fuzzy c-
mean Clustering, KDD’99 dataset
I. INTRODUCTION
Early Internet architecture design goals did not put security as a high priority. However, today
Internet security is a quickly growing concern. The prevalence of Internet attacks has increased
significantly, but still the challenge of detecting such attacks generally falls on the end hosts and service
providers, requiring system administrators to detect and block attacks on their own. In particular, as
social networks have become central hubs of information and communication, they are increasingly the
target of attention and attacks. Thus a challenge of carefully distinguishing malicious connections from
normal ones is created. Previous work has shown that for a variety of Internet attacks, there is a small
subset of connection measurements that are good indicators of whether a connection is part of an attack
or not. These security issue creates the challenge for system administrators to distinguish normal
connections of legitimate users from malicious connections. An administrator, in the face of an attack,
wants to block such malicious connections without blocking legitimate users. One can never know for
sure if any given connection is legitimate or malicious, but one can attempt to isolate a set of
connections that stand out from normal user behaviour, so as to help system administrators detect attacks
which is done by a network intrusion detection system.
1.1 INTRUSION DETECTION SYSTEM
An intrusion detection system (IDS) monitors network traffic and monitors for suspicious
activity and alerts the system or network administrator. As shown in Figure 1.1, in some cases the IDS
may also respond to anomalous or malicious traffic by taking action such as blocking the user or source
IP address from accessing the network. IDS come in a variety of “flavours” and approach the goal of
detecting suspicious traffic in different ways. There are network based (NIDS) and host based (HIDS)
International Journal of Modern Trends in Engineering and Research (IJMTER)
Volume 01, Issue 06, [December - 2014] e-ISSN: 2349-9745, p-ISSN: 2393-8161
@IJMTER-2014, All rights Reserved 90
intrusion detection systems. There are IDS that detect based on looking for specific signatures of known
threats- similar to the way antivirus software typically detects and protects against malware- and there
are IDS that detect based on comparing traffic patterns against a baseline and looking for anomalies.
There are IDS that simply monitor and alert and there are IDS that perform an action or actions in
response to a detected threat.
Figure 1.1 An Intrusion Detection System
Two types of intrusion detection systems are Misuse Intrusion Detection-Misuse or
Signature intrusion detection refers to intrusion that follows well-defined patterns of attack that exploit
weaknesses in system and application software. Such patterns can be precisely written in advance.
Anomaly Intrusion Detection -An IDS which is anomaly based will monitor network traffic and
compare it against an established baseline. The baseline will identify what is “normal” for that network-
what sort of bandwidth is generally used, what protocols are used, what ports and devices generally
connect to each other- and alert the administrator or user when traffic is detected which is anomalous, or
significantly different, than the baseline.
International Journal of Modern Trends in Engineering and Research (IJMTER)
Volume 01, Issue 06, [December - 2014] e-ISSN: 2349-9745, p-ISSN: 2393-8161
@IJMTER-2014, All rights Reserved 91
II. EXISTING SYSTEM
Different terminologies are used in various applications, such as Novelty or surprise
detection and fault detection. Novelty detection is a useful technique in cases where an important class
of data is represented in training set. This means that the performance of the network will be poor for
those classes. If the training data only consists of examples from one class and the test data contains
examples from two or more classes, the classification task is called anomaly detection or novelty
detection. With enterprise networks, network analysers are often attached to the lines in order to monitor
traffic and send an alarm when disruptions are detected.
Gunes Kayacik et al., (2010), KDD means Knowledge discovery and data mining. It is
collection of various datasets. KDD Cup 99 dataset consists of network based datasets which was used
as training set for creating a IDS Model using cascaded classification technique. The NSL-KDD is the
new version KDD’99 data set. It solves some of the inherent problems of the KDD’99 data set. It can be
applied to an effective data set to help researchers compare different intrusion detection methods. It runs
the experiment on the complete set without the need to randomly select a small portion. In the existing
system, Intrusion detection systems have been used to detect known attacks by matching misused traffic
patterns or signatures. A class of IDS that leverages machine learning can also detect unknown attacks
by identifying abnormal network traffic that deviates from the so-called “normal” behavior previously
profiled during the IDS training phase. Most of intrusion detection systems nowadays rely on
handcrafted signatures just like anti-viruses which have to be updated continuously in order to be
effective against new attacks.
III. PROPOSED SYSTEM
The main of the he proposed system is to provide a hybrid framework combining the two
anomaly detectors namely CUSUM and Fuzzy C-means clustering technique. KDD Cup 99 dataset
consists of network based datasets. This dataset is used as an input for the process. Cumulative Sum
algorithm (CuSum) is used to detect anomalies based on statistical information of packets in the
networks. In brief, CUSUM detect changes based on the cumulative effect of the changes made in the
random sequence instead of using a single threshold to check every variable. CUSUM is a broadly
adopted algorithm for detection of abrupt traffic flow change, especially for DoS packet flooding.
CUSUM is good at detecting the abrupt change of the mean of an observed sequence. By adjusting
parameters of CUSUM, one can make trade off between the detection sensitivity and the degree of
noise-resilience in an anomaly detection system. Unlike crisp clustering that crisply assigns each data
point to a separate cluster, fuzzy clustering allows each data point to belong to various clusters with
different membership degrees (or weights). Fuzzy clusters are expressed by their centers (or centroids)
that are simultaneously found in the partitioning process of a fuzzy clustering algorithm. The number of
clusters is often inputted as a parameter to a fuzzy clustering algorithm.
3.1 MODULES DESCRIPTION
The proposed system considers the three sub processes. They are as follows:
• Feature Selection
• CUSUM
• Clustering
International Journal of Modern Trends in Engineering and Research (IJMTER)
Volume 01, Issue 06, [December - 2014] e-ISSN: 2349-9745, p-ISSN: 2393-8161
@IJMTER-2014, All rights Reserved 92
Figure 3.1 System Flow Diagram
3.1.1 Feature Selection
The KDD 99 intrusion detection datasets are based on the 1998 DARPA initiative, which provides
designers of intrusion detection systems (IDS) with a benchmark on which to evaluate different
methodologies. The raw data collected is usually substantially large, so it is desired that one select a
subset of this data by creating feature vectors that represent most of the information we need from the
data. There are 41 features in the KDD Cup 99 dataset, out of which 11 features are selected here. The
selected features are: Duration, Protocol Type, Service, Flag, Count, Src_bytes, Dets_bytes, Land,
Urgent, Wrong fragment, Logged in. All these features belong to the intrinsic attributes. Feature
selection is done for selecting a subset of relevant features for use in a dataset. The central assumption
when using a feature selection technique is that the data contains many redundant or irrelevant features.
Redundant features are those which provide no more information than the currently selected features,
and irrelevant features provide no useful information in any context. Feature selection returns a subset of
the features. Selections of these features provide two main benefits: shorter training times,Eliminate
features with less or no predictive information.
3.1.2 CUSUM
A procedure, named Change-Point Detection designed to detect the change point of a
network behaviour, is as follows. First, compare observed event sequence with user profiles. If any
difference is significant, identify the time point the change happens so as to real time discover when the
attack starts. Second, CUSUM is deployed to sequentially monitor input random variables. A simple
parametric approach is often too simple to accurately model a network session due to the complexity of
Internet. CUSUM with the characteristics of sequential and nonparametric light computation load can
make IDS work online.
International Journal of Modern Trends in Engineering and Research (IJMTER)
Volume 01, Issue 06, [December - 2014] e-ISSN: 2349-9745, p-ISSN: 2393-8161
@IJMTER-2014, All rights Reserved 93
In statistical quality control, the CUSUM (or cumulative sum control chart) is a sequential
analysis technique used for monitoring change detection. CUSUM involves the calculation of a
cumulative sum and it can determine if a node is a zombie or not. The CUSUM algorithm is an approach
to detect a change of the mean value of a stochastic process and it is based on the fact that if a change
occurs, the probability distribution of the random sequence will also be changed.
Algorithm
CuSum = 0
n = 0
Repeat
n = n + 1
CuSum = CuSum + Xn
If CuSum > ThresHold
then Signal attack indication Until Finished
The cusum value is initially initialised to zero. n is the packet number. The cumulative sum
is calculated. A threshold value is set and when the cusum value exceeds the cumulative sum the
packet could be considered as an attack packet or else it is ignored.
3.1.3 Clustering
Cluster analysis is identifying such grouping (or clusters) in an unsupervised manners, in
unsupervised approach are divides a set of objects into homogeneous groups. There have been many
clustering algorithms scattered in publications in much diversified areas such as pattern recognition,
artificial intelligence, information technology, image processing, biology, psychology, and marketing.
Clustering algorithms can be classified into main two categories: hard clustering algorithms and fuzzy
clustering algorithms. Unlike hard clustering algorithms, which require that each data point of the data
set belong to one and only one cluster, fuzzy clustering algorithms allow a data point to belong to two or
more clusters with different probabilities. Basically hard clustering has each document belongs to
exactly one cluster. In hard clustering a hard partition of the dataset is made.
The clustering algorithm employed here is called as the Fuzzy C-means algorithm (FCM).
The FCM employs fuzzy partitioning such that a data point can belong to all groups with different
membership grades between 0 and 1. Fuzzy C-means Clustering (FCM) is also known as Fuzzy
ISODATA, is a clustering technique which is separated from hard k-means that employs hard
partitioning.FCM is an iterative algorithm. The aim of FCM is to find cluster centers (centroid) that
minimize a dissimilarity function. This algorithm works by assigning membership to each data point
corresponding to each cluster center on the basis of distance between the cluster center and the data
point. Fuzzy Clustering also called soft clustering. In fuzzy clustering fuzzy partition of the data set is
made. Fuzzy clustering uses membership function in partition data set. To accommodate the
introduction of fuzzy partitioning, the membership matrix (U) is randomly initialized.
1. Σc
i=1 uij =1, for all j=1,......,n
International Journal of Modern Trends in Engineering and Research (IJMTER)
Volume 01, Issue 06, [December - 2014] e-ISSN: 2349-9745, p-ISSN: 2393-8161
@IJMTER-2014, All rights Reserved 94
This function is called membership function and its value between 0 and 1.To find the value of
centroid (ci) with help of membership matrix (uij).
Σn
j=1 uij
m
Xj
2. ci =
Σn
j=1 uij
m
The dissimilarity function which is used in FCM is given Equation
J(U,c1,c2,..,ce) = Σe
i=1 Ji = = Σe
i=1 Σn
j=1 uij
m
d2
ij
uij is between 0 and 1
dij is the Euclidian distance between ith centroid (ci) and jth data point ;
where dij= √ Σni=1 (Xi – Ci)2
1
Uij =
Σc
k=1 (dij/ dkj)2/(m-1)
If || U(k+1) – U(k) || < ε
Then STOP; otherwise return to step 2.
IV. RESULTS AND DISCUSSION
The main performance measure for evaluating the intrusion detection model is detection
rate. Detection rate is defined as how accurately the IDS classifies the test data set. Here CUSUM and
Clustering algorithms are combined together for better efficiency. There are 11 attributes which are
selected from 41 features of the KDD data set. There are around 494,020 records which is too large for
our purpose. Hence a concise dataset 10% KDD Cup 99 is employed here. It could be seen that the
CUSUM was able to detect around 1200 attack packets while FCM was able to find around 1450
packets which clearly shows that FCM is far better than that of CUSUM. A graph depicting the number
of attack packets detected by each algorithm is shown here in Figure 4.1.
Figure 4.1 No of attack packets detected
International Journal of Modern Trends in Engineering and Research (IJMTER)
Volume 01, Issue 06, [December - 2014] e-ISSN: 2349-9745, p-ISSN: 2393-8161
@IJMTER-2014, All rights Reserved 95
V. CONCLUSION AND FUTURE WORKS
Intrusion Detection System plays an important role in computer security. IDS users relying
on the IDS to protect their computers and networks demand that an IDS provide reliable and continuous
detection service. However, many of the today’s anomaly detection methods generate high false and
negatives. The CUSUM and Fuzzy C means algorithm is a good technique to address the problem. All
anomaly-based intrusion detection system, work on the assumption that normal activities differ from the
abnormal activities substantially. In the existing system, various other novel algorithms such as K-means
are employed. Here, two algorithms based on CUSUM and Fuzzy C Means is used for analyzing the
behavior in the intrusion detection are evaluated by experiments. The preliminary experiments with the
KDD Cup 99 dataset have shown that this approach is able to effectively detect intrusive behavior. The
results also show that a low false positive rate can be achieved. More change point detection algorithms
like Shiryaev-Roberts procedure could also be added in order to minimize the false alarm rate. The
proposed system is an applied for dataset. Online packets could be caught and could be fed as an input to
the IDS using CUSUM and clustering.
REFERENCES
[1] Alexander G Tartakovsky, Aleksey S Polunchenko and Grigory Sokolov,‘Efficient Computer
Network Anomaly Detection by Changepoint Detection Methods,’ IEEE Journal of Selected topics in
Signal Processing, Vol. 7, No. 1, pp.4-11,2013.
[2] Thatte G, Mitra U, and Heidemann J, ‘Parametric Methods For Anomaly Detection In Aggregate
Traffic,’ IEEE/ACM Transactions on Networking, Vol. 19, No. 2, pp.512–525,2011
[3] Dash M and Liu H, ‘Feature Selection for Clustering,’ Proceedings of Pacific-Asia Conference on
Knowledge Discovery and Data Mining (PAKDD), Vol. 5, No.8, pp.110–121,2000.
[4] Wu Jain, Feng Guo Rui, ‘Intrusion Detection Based On Simulated Annealing And Fuzzy C-means
Clustering,’ MINES International Conference, Vol. 2, No.1, pp.382-385,2009.
[5] Hiren S, Jeffrey Ur, Anupam J, ‘Fuzzy Clustering for Intrusion Detection,’ The 12th
IEEE
International Conference on Fuzzy Systems, Vol.2, No.5 pp.1274-1278.2003.
DETECTING NETWORK ANOMALIES USING CUSUM and FCM
DETECTING NETWORK ANOMALIES USING CUSUM and FCM

More Related Content

What's hot

An efficient intrusion detection using relevance vector machine
An efficient intrusion detection using relevance vector machineAn efficient intrusion detection using relevance vector machine
An efficient intrusion detection using relevance vector machineIAEME Publication
 
Secure intrusion detection and countermeasure selection in virtual system usi...
Secure intrusion detection and countermeasure selection in virtual system usi...Secure intrusion detection and countermeasure selection in virtual system usi...
Secure intrusion detection and countermeasure selection in virtual system usi...eSAT Publishing House
 
AN EFFICIENT INTRUSION DETECTION SYSTEM WITH CUSTOM FEATURES USING FPA-GRADIE...
AN EFFICIENT INTRUSION DETECTION SYSTEM WITH CUSTOM FEATURES USING FPA-GRADIE...AN EFFICIENT INTRUSION DETECTION SYSTEM WITH CUSTOM FEATURES USING FPA-GRADIE...
AN EFFICIENT INTRUSION DETECTION SYSTEM WITH CUSTOM FEATURES USING FPA-GRADIE...IJCNCJournal
 
IRJET - A Secure Approach for Intruder Detection using Backtracking
IRJET -  	  A Secure Approach for Intruder Detection using BacktrackingIRJET -  	  A Secure Approach for Intruder Detection using Backtracking
IRJET - A Secure Approach for Intruder Detection using BacktrackingIRJET Journal
 
IMPROVED IDS USING LAYERED CRFS WITH LOGON RESTRICTIONS AND MOBILE ALERTS BAS...
IMPROVED IDS USING LAYERED CRFS WITH LOGON RESTRICTIONS AND MOBILE ALERTS BAS...IMPROVED IDS USING LAYERED CRFS WITH LOGON RESTRICTIONS AND MOBILE ALERTS BAS...
IMPROVED IDS USING LAYERED CRFS WITH LOGON RESTRICTIONS AND MOBILE ALERTS BAS...IJNSA Journal
 
DB-OLS: An Approach for IDS1
DB-OLS: An Approach for IDS1DB-OLS: An Approach for IDS1
DB-OLS: An Approach for IDS1IJITE
 
HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NE...
HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NE...HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NE...
HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NE...IJNSA Journal
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
Evaluation of network intrusion detection using markov chain
Evaluation of network intrusion detection using markov chainEvaluation of network intrusion detection using markov chain
Evaluation of network intrusion detection using markov chainIJCI JOURNAL
 
Alert Analysis using Fuzzy Clustering and Artificial Neural Network
Alert Analysis using Fuzzy Clustering and Artificial Neural NetworkAlert Analysis using Fuzzy Clustering and Artificial Neural Network
Alert Analysis using Fuzzy Clustering and Artificial Neural NetworkIJRES Journal
 
Hybrid Technique for Detection of Denial of Service (DOS) Attack in Wireless ...
Hybrid Technique for Detection of Denial of Service (DOS) Attack in Wireless ...Hybrid Technique for Detection of Denial of Service (DOS) Attack in Wireless ...
Hybrid Technique for Detection of Denial of Service (DOS) Attack in Wireless ...Eswar Publications
 
Enhanced Intrusion Detection System using Feature Selection Method and Ensemb...
Enhanced Intrusion Detection System using Feature Selection Method and Ensemb...Enhanced Intrusion Detection System using Feature Selection Method and Ensemb...
Enhanced Intrusion Detection System using Feature Selection Method and Ensemb...IJCSIS Research Publications
 

What's hot (17)

An efficient intrusion detection using relevance vector machine
An efficient intrusion detection using relevance vector machineAn efficient intrusion detection using relevance vector machine
An efficient intrusion detection using relevance vector machine
 
Secure intrusion detection and countermeasure selection in virtual system usi...
Secure intrusion detection and countermeasure selection in virtual system usi...Secure intrusion detection and countermeasure selection in virtual system usi...
Secure intrusion detection and countermeasure selection in virtual system usi...
 
AN EFFICIENT INTRUSION DETECTION SYSTEM WITH CUSTOM FEATURES USING FPA-GRADIE...
AN EFFICIENT INTRUSION DETECTION SYSTEM WITH CUSTOM FEATURES USING FPA-GRADIE...AN EFFICIENT INTRUSION DETECTION SYSTEM WITH CUSTOM FEATURES USING FPA-GRADIE...
AN EFFICIENT INTRUSION DETECTION SYSTEM WITH CUSTOM FEATURES USING FPA-GRADIE...
 
1850 1854
1850 18541850 1854
1850 1854
 
Ijnsa050214
Ijnsa050214Ijnsa050214
Ijnsa050214
 
1762 1765
1762 17651762 1765
1762 1765
 
IRJET - A Secure Approach for Intruder Detection using Backtracking
IRJET -  	  A Secure Approach for Intruder Detection using BacktrackingIRJET -  	  A Secure Approach for Intruder Detection using Backtracking
IRJET - A Secure Approach for Intruder Detection using Backtracking
 
IMPROVED IDS USING LAYERED CRFS WITH LOGON RESTRICTIONS AND MOBILE ALERTS BAS...
IMPROVED IDS USING LAYERED CRFS WITH LOGON RESTRICTIONS AND MOBILE ALERTS BAS...IMPROVED IDS USING LAYERED CRFS WITH LOGON RESTRICTIONS AND MOBILE ALERTS BAS...
IMPROVED IDS USING LAYERED CRFS WITH LOGON RESTRICTIONS AND MOBILE ALERTS BAS...
 
Layered approach
Layered approachLayered approach
Layered approach
 
Ijnsa050208
Ijnsa050208Ijnsa050208
Ijnsa050208
 
DB-OLS: An Approach for IDS1
DB-OLS: An Approach for IDS1DB-OLS: An Approach for IDS1
DB-OLS: An Approach for IDS1
 
HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NE...
HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NE...HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NE...
HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NE...
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
Evaluation of network intrusion detection using markov chain
Evaluation of network intrusion detection using markov chainEvaluation of network intrusion detection using markov chain
Evaluation of network intrusion detection using markov chain
 
Alert Analysis using Fuzzy Clustering and Artificial Neural Network
Alert Analysis using Fuzzy Clustering and Artificial Neural NetworkAlert Analysis using Fuzzy Clustering and Artificial Neural Network
Alert Analysis using Fuzzy Clustering and Artificial Neural Network
 
Hybrid Technique for Detection of Denial of Service (DOS) Attack in Wireless ...
Hybrid Technique for Detection of Denial of Service (DOS) Attack in Wireless ...Hybrid Technique for Detection of Denial of Service (DOS) Attack in Wireless ...
Hybrid Technique for Detection of Denial of Service (DOS) Attack in Wireless ...
 
Enhanced Intrusion Detection System using Feature Selection Method and Ensemb...
Enhanced Intrusion Detection System using Feature Selection Method and Ensemb...Enhanced Intrusion Detection System using Feature Selection Method and Ensemb...
Enhanced Intrusion Detection System using Feature Selection Method and Ensemb...
 

Similar to DETECTING NETWORK ANOMALIES USING CUSUM and FCM

Articles - International Journal of Network Security & Its Applications (IJNSA)
Articles - International Journal of Network Security & Its Applications (IJNSA)Articles - International Journal of Network Security & Its Applications (IJNSA)
Articles - International Journal of Network Security & Its Applications (IJNSA)IJNSA Journal
 
A SURVEY ON THE USE OF DATA CLUSTERING FOR INTRUSION DETECTION SYSTEM IN CYBE...
A SURVEY ON THE USE OF DATA CLUSTERING FOR INTRUSION DETECTION SYSTEM IN CYBE...A SURVEY ON THE USE OF DATA CLUSTERING FOR INTRUSION DETECTION SYSTEM IN CYBE...
A SURVEY ON THE USE OF DATA CLUSTERING FOR INTRUSION DETECTION SYSTEM IN CYBE...IJNSA Journal
 
Current issues - International Journal of Network Security & Its Applications...
Current issues - International Journal of Network Security & Its Applications...Current issues - International Journal of Network Security & Its Applications...
Current issues - International Journal of Network Security & Its Applications...IJNSA Journal
 
FORTIFICATION OF HYBRID INTRUSION DETECTION SYSTEM USING VARIANTS OF NEURAL ...
FORTIFICATION OF HYBRID INTRUSION  DETECTION SYSTEM USING VARIANTS OF NEURAL ...FORTIFICATION OF HYBRID INTRUSION  DETECTION SYSTEM USING VARIANTS OF NEURAL ...
FORTIFICATION OF HYBRID INTRUSION DETECTION SYSTEM USING VARIANTS OF NEURAL ...IJNSA Journal
 
Survey on Host and Network Based Intrusion Detection System
Survey on Host and Network Based Intrusion Detection SystemSurvey on Host and Network Based Intrusion Detection System
Survey on Host and Network Based Intrusion Detection SystemEswar Publications
 
Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Editor IJARCET
 
Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Editor IJARCET
 
Current Studies On Intrusion Detection System, Genetic Algorithm And Fuzzy Logic
Current Studies On Intrusion Detection System, Genetic Algorithm And Fuzzy LogicCurrent Studies On Intrusion Detection System, Genetic Algorithm And Fuzzy Logic
Current Studies On Intrusion Detection System, Genetic Algorithm And Fuzzy Logicijdpsjournal
 
COPYRIGHTThis thesis is copyright materials protected under the .docx
COPYRIGHTThis thesis is copyright materials protected under the .docxCOPYRIGHTThis thesis is copyright materials protected under the .docx
COPYRIGHTThis thesis is copyright materials protected under the .docxvoversbyobersby
 
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT A system-for-denial-of-service-...
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT A system-for-denial-of-service-...2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT A system-for-denial-of-service-...
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT A system-for-denial-of-service-...IEEEGLOBALSOFTSTUDENTSPROJECTS
 
IEEE 2014 DOTNET PARALLEL DISTRIBUTED PROJECTS A system-for-denial-of-service...
IEEE 2014 DOTNET PARALLEL DISTRIBUTED PROJECTS A system-for-denial-of-service...IEEE 2014 DOTNET PARALLEL DISTRIBUTED PROJECTS A system-for-denial-of-service...
IEEE 2014 DOTNET PARALLEL DISTRIBUTED PROJECTS A system-for-denial-of-service...IEEEMEMTECHSTUDENTPROJECTS
 
INTRUSION DETECTION SYSTEM CLASSIFICATION USING DIFFERENT MACHINE LEARNING AL...
INTRUSION DETECTION SYSTEM CLASSIFICATION USING DIFFERENT MACHINE LEARNING AL...INTRUSION DETECTION SYSTEM CLASSIFICATION USING DIFFERENT MACHINE LEARNING AL...
INTRUSION DETECTION SYSTEM CLASSIFICATION USING DIFFERENT MACHINE LEARNING AL...ijcsit
 
Intrusion Detection System Classification Using Different Machine Learning Al...
Intrusion Detection System Classification Using Different Machine Learning Al...Intrusion Detection System Classification Using Different Machine Learning Al...
Intrusion Detection System Classification Using Different Machine Learning Al...AIRCC Publishing Corporation
 
JPD1424 A System for Denial-of-Service Attack Detection Based on Multivariat...
JPD1424  A System for Denial-of-Service Attack Detection Based on Multivariat...JPD1424  A System for Denial-of-Service Attack Detection Based on Multivariat...
JPD1424 A System for Denial-of-Service Attack Detection Based on Multivariat...chennaijp
 
The Practical Data Mining Model for Efficient IDS through Relational Databases
The Practical Data Mining Model for Efficient IDS through Relational DatabasesThe Practical Data Mining Model for Efficient IDS through Relational Databases
The Practical Data Mining Model for Efficient IDS through Relational DatabasesIJRES Journal
 
ATTACK DETECTION AVAILING FEATURE DISCRETION USING RANDOM FOREST CLASSIFIER
ATTACK DETECTION AVAILING FEATURE DISCRETION USING RANDOM FOREST CLASSIFIERATTACK DETECTION AVAILING FEATURE DISCRETION USING RANDOM FOREST CLASSIFIER
ATTACK DETECTION AVAILING FEATURE DISCRETION USING RANDOM FOREST CLASSIFIERCSEIJJournal
 
Attack Detection Availing Feature Discretion using Random Forest Classifier
Attack Detection Availing Feature Discretion using Random Forest ClassifierAttack Detection Availing Feature Discretion using Random Forest Classifier
Attack Detection Availing Feature Discretion using Random Forest ClassifierCSEIJJournal
 
EFFICACY OF ATTACK DETECTION CAPABILITY OF IDPS BASED ON ITS DEPLOYMENT IN WI...
EFFICACY OF ATTACK DETECTION CAPABILITY OF IDPS BASED ON ITS DEPLOYMENT IN WI...EFFICACY OF ATTACK DETECTION CAPABILITY OF IDPS BASED ON ITS DEPLOYMENT IN WI...
EFFICACY OF ATTACK DETECTION CAPABILITY OF IDPS BASED ON ITS DEPLOYMENT IN WI...IJNSA Journal
 

Similar to DETECTING NETWORK ANOMALIES USING CUSUM and FCM (20)

Articles - International Journal of Network Security & Its Applications (IJNSA)
Articles - International Journal of Network Security & Its Applications (IJNSA)Articles - International Journal of Network Security & Its Applications (IJNSA)
Articles - International Journal of Network Security & Its Applications (IJNSA)
 
A SURVEY ON THE USE OF DATA CLUSTERING FOR INTRUSION DETECTION SYSTEM IN CYBE...
A SURVEY ON THE USE OF DATA CLUSTERING FOR INTRUSION DETECTION SYSTEM IN CYBE...A SURVEY ON THE USE OF DATA CLUSTERING FOR INTRUSION DETECTION SYSTEM IN CYBE...
A SURVEY ON THE USE OF DATA CLUSTERING FOR INTRUSION DETECTION SYSTEM IN CYBE...
 
Current issues - International Journal of Network Security & Its Applications...
Current issues - International Journal of Network Security & Its Applications...Current issues - International Journal of Network Security & Its Applications...
Current issues - International Journal of Network Security & Its Applications...
 
FORTIFICATION OF HYBRID INTRUSION DETECTION SYSTEM USING VARIANTS OF NEURAL ...
FORTIFICATION OF HYBRID INTRUSION  DETECTION SYSTEM USING VARIANTS OF NEURAL ...FORTIFICATION OF HYBRID INTRUSION  DETECTION SYSTEM USING VARIANTS OF NEURAL ...
FORTIFICATION OF HYBRID INTRUSION DETECTION SYSTEM USING VARIANTS OF NEURAL ...
 
Survey on Host and Network Based Intrusion Detection System
Survey on Host and Network Based Intrusion Detection SystemSurvey on Host and Network Based Intrusion Detection System
Survey on Host and Network Based Intrusion Detection System
 
Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194
 
Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194
 
Kx3419591964
Kx3419591964Kx3419591964
Kx3419591964
 
Current Studies On Intrusion Detection System, Genetic Algorithm And Fuzzy Logic
Current Studies On Intrusion Detection System, Genetic Algorithm And Fuzzy LogicCurrent Studies On Intrusion Detection System, Genetic Algorithm And Fuzzy Logic
Current Studies On Intrusion Detection System, Genetic Algorithm And Fuzzy Logic
 
1850 1854
1850 18541850 1854
1850 1854
 
COPYRIGHTThis thesis is copyright materials protected under the .docx
COPYRIGHTThis thesis is copyright materials protected under the .docxCOPYRIGHTThis thesis is copyright materials protected under the .docx
COPYRIGHTThis thesis is copyright materials protected under the .docx
 
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT A system-for-denial-of-service-...
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT A system-for-denial-of-service-...2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT A system-for-denial-of-service-...
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT A system-for-denial-of-service-...
 
IEEE 2014 DOTNET PARALLEL DISTRIBUTED PROJECTS A system-for-denial-of-service...
IEEE 2014 DOTNET PARALLEL DISTRIBUTED PROJECTS A system-for-denial-of-service...IEEE 2014 DOTNET PARALLEL DISTRIBUTED PROJECTS A system-for-denial-of-service...
IEEE 2014 DOTNET PARALLEL DISTRIBUTED PROJECTS A system-for-denial-of-service...
 
INTRUSION DETECTION SYSTEM CLASSIFICATION USING DIFFERENT MACHINE LEARNING AL...
INTRUSION DETECTION SYSTEM CLASSIFICATION USING DIFFERENT MACHINE LEARNING AL...INTRUSION DETECTION SYSTEM CLASSIFICATION USING DIFFERENT MACHINE LEARNING AL...
INTRUSION DETECTION SYSTEM CLASSIFICATION USING DIFFERENT MACHINE LEARNING AL...
 
Intrusion Detection System Classification Using Different Machine Learning Al...
Intrusion Detection System Classification Using Different Machine Learning Al...Intrusion Detection System Classification Using Different Machine Learning Al...
Intrusion Detection System Classification Using Different Machine Learning Al...
 
JPD1424 A System for Denial-of-Service Attack Detection Based on Multivariat...
JPD1424  A System for Denial-of-Service Attack Detection Based on Multivariat...JPD1424  A System for Denial-of-Service Attack Detection Based on Multivariat...
JPD1424 A System for Denial-of-Service Attack Detection Based on Multivariat...
 
The Practical Data Mining Model for Efficient IDS through Relational Databases
The Practical Data Mining Model for Efficient IDS through Relational DatabasesThe Practical Data Mining Model for Efficient IDS through Relational Databases
The Practical Data Mining Model for Efficient IDS through Relational Databases
 
ATTACK DETECTION AVAILING FEATURE DISCRETION USING RANDOM FOREST CLASSIFIER
ATTACK DETECTION AVAILING FEATURE DISCRETION USING RANDOM FOREST CLASSIFIERATTACK DETECTION AVAILING FEATURE DISCRETION USING RANDOM FOREST CLASSIFIER
ATTACK DETECTION AVAILING FEATURE DISCRETION USING RANDOM FOREST CLASSIFIER
 
Attack Detection Availing Feature Discretion using Random Forest Classifier
Attack Detection Availing Feature Discretion using Random Forest ClassifierAttack Detection Availing Feature Discretion using Random Forest Classifier
Attack Detection Availing Feature Discretion using Random Forest Classifier
 
EFFICACY OF ATTACK DETECTION CAPABILITY OF IDPS BASED ON ITS DEPLOYMENT IN WI...
EFFICACY OF ATTACK DETECTION CAPABILITY OF IDPS BASED ON ITS DEPLOYMENT IN WI...EFFICACY OF ATTACK DETECTION CAPABILITY OF IDPS BASED ON ITS DEPLOYMENT IN WI...
EFFICACY OF ATTACK DETECTION CAPABILITY OF IDPS BASED ON ITS DEPLOYMENT IN WI...
 

More from Editor IJMTER

A NEW DATA ENCODER AND DECODER SCHEME FOR NETWORK ON CHIP
A NEW DATA ENCODER AND DECODER SCHEME FOR  NETWORK ON CHIPA NEW DATA ENCODER AND DECODER SCHEME FOR  NETWORK ON CHIP
A NEW DATA ENCODER AND DECODER SCHEME FOR NETWORK ON CHIPEditor IJMTER
 
A RESEARCH - DEVELOP AN EFFICIENT ALGORITHM TO RECOGNIZE, SEPARATE AND COUNT ...
A RESEARCH - DEVELOP AN EFFICIENT ALGORITHM TO RECOGNIZE, SEPARATE AND COUNT ...A RESEARCH - DEVELOP AN EFFICIENT ALGORITHM TO RECOGNIZE, SEPARATE AND COUNT ...
A RESEARCH - DEVELOP AN EFFICIENT ALGORITHM TO RECOGNIZE, SEPARATE AND COUNT ...Editor IJMTER
 
Analysis of VoIP Traffic in WiMAX Environment
Analysis of VoIP Traffic in WiMAX EnvironmentAnalysis of VoIP Traffic in WiMAX Environment
Analysis of VoIP Traffic in WiMAX EnvironmentEditor IJMTER
 
A Hybrid Cloud Approach for Secure Authorized De-Duplication
A Hybrid Cloud Approach for Secure Authorized De-DuplicationA Hybrid Cloud Approach for Secure Authorized De-Duplication
A Hybrid Cloud Approach for Secure Authorized De-DuplicationEditor IJMTER
 
Aging protocols that could incapacitate the Internet
Aging protocols that could incapacitate the InternetAging protocols that could incapacitate the Internet
Aging protocols that could incapacitate the InternetEditor IJMTER
 
A Cloud Computing design with Wireless Sensor Networks For Agricultural Appli...
A Cloud Computing design with Wireless Sensor Networks For Agricultural Appli...A Cloud Computing design with Wireless Sensor Networks For Agricultural Appli...
A Cloud Computing design with Wireless Sensor Networks For Agricultural Appli...Editor IJMTER
 
A CAR POOLING MODEL WITH CMGV AND CMGNV STOCHASTIC VEHICLE TRAVEL TIMES
A CAR POOLING MODEL WITH CMGV AND CMGNV STOCHASTIC VEHICLE TRAVEL TIMESA CAR POOLING MODEL WITH CMGV AND CMGNV STOCHASTIC VEHICLE TRAVEL TIMES
A CAR POOLING MODEL WITH CMGV AND CMGNV STOCHASTIC VEHICLE TRAVEL TIMESEditor IJMTER
 
Sustainable Construction With Foam Concrete As A Green Green Building Material
Sustainable Construction With Foam Concrete As A Green Green Building MaterialSustainable Construction With Foam Concrete As A Green Green Building Material
Sustainable Construction With Foam Concrete As A Green Green Building MaterialEditor IJMTER
 
USE OF ICT IN EDUCATION ONLINE COMPUTER BASED TEST
USE OF ICT IN EDUCATION ONLINE COMPUTER BASED TESTUSE OF ICT IN EDUCATION ONLINE COMPUTER BASED TEST
USE OF ICT IN EDUCATION ONLINE COMPUTER BASED TESTEditor IJMTER
 
Textual Data Partitioning with Relationship and Discriminative Analysis
Textual Data Partitioning with Relationship and Discriminative AnalysisTextual Data Partitioning with Relationship and Discriminative Analysis
Textual Data Partitioning with Relationship and Discriminative AnalysisEditor IJMTER
 
Testing of Matrices Multiplication Methods on Different Processors
Testing of Matrices Multiplication Methods on Different ProcessorsTesting of Matrices Multiplication Methods on Different Processors
Testing of Matrices Multiplication Methods on Different ProcessorsEditor IJMTER
 
Survey on Malware Detection Techniques
Survey on Malware Detection TechniquesSurvey on Malware Detection Techniques
Survey on Malware Detection TechniquesEditor IJMTER
 
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICESURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICEEditor IJMTER
 
SURVEY OF GLAUCOMA DETECTION METHODS
SURVEY OF GLAUCOMA DETECTION METHODSSURVEY OF GLAUCOMA DETECTION METHODS
SURVEY OF GLAUCOMA DETECTION METHODSEditor IJMTER
 
Survey: Multipath routing for Wireless Sensor Network
Survey: Multipath routing for Wireless Sensor NetworkSurvey: Multipath routing for Wireless Sensor Network
Survey: Multipath routing for Wireless Sensor NetworkEditor IJMTER
 
Step up DC-DC Impedance source network based PMDC Motor Drive
Step up DC-DC Impedance source network based PMDC Motor DriveStep up DC-DC Impedance source network based PMDC Motor Drive
Step up DC-DC Impedance source network based PMDC Motor DriveEditor IJMTER
 
SPIRITUAL PERSPECTIVE OF AUROBINDO GHOSH’S PHILOSOPHY IN TODAY’S EDUCATION
SPIRITUAL PERSPECTIVE OF AUROBINDO GHOSH’S PHILOSOPHY IN TODAY’S EDUCATIONSPIRITUAL PERSPECTIVE OF AUROBINDO GHOSH’S PHILOSOPHY IN TODAY’S EDUCATION
SPIRITUAL PERSPECTIVE OF AUROBINDO GHOSH’S PHILOSOPHY IN TODAY’S EDUCATIONEditor IJMTER
 
Software Quality Analysis Using Mutation Testing Scheme
Software Quality Analysis Using Mutation Testing SchemeSoftware Quality Analysis Using Mutation Testing Scheme
Software Quality Analysis Using Mutation Testing SchemeEditor IJMTER
 
Software Defect Prediction Using Local and Global Analysis
Software Defect Prediction Using Local and Global AnalysisSoftware Defect Prediction Using Local and Global Analysis
Software Defect Prediction Using Local and Global AnalysisEditor IJMTER
 
Software Cost Estimation Using Clustering and Ranking Scheme
Software Cost Estimation Using Clustering and Ranking SchemeSoftware Cost Estimation Using Clustering and Ranking Scheme
Software Cost Estimation Using Clustering and Ranking SchemeEditor IJMTER
 

More from Editor IJMTER (20)

A NEW DATA ENCODER AND DECODER SCHEME FOR NETWORK ON CHIP
A NEW DATA ENCODER AND DECODER SCHEME FOR  NETWORK ON CHIPA NEW DATA ENCODER AND DECODER SCHEME FOR  NETWORK ON CHIP
A NEW DATA ENCODER AND DECODER SCHEME FOR NETWORK ON CHIP
 
A RESEARCH - DEVELOP AN EFFICIENT ALGORITHM TO RECOGNIZE, SEPARATE AND COUNT ...
A RESEARCH - DEVELOP AN EFFICIENT ALGORITHM TO RECOGNIZE, SEPARATE AND COUNT ...A RESEARCH - DEVELOP AN EFFICIENT ALGORITHM TO RECOGNIZE, SEPARATE AND COUNT ...
A RESEARCH - DEVELOP AN EFFICIENT ALGORITHM TO RECOGNIZE, SEPARATE AND COUNT ...
 
Analysis of VoIP Traffic in WiMAX Environment
Analysis of VoIP Traffic in WiMAX EnvironmentAnalysis of VoIP Traffic in WiMAX Environment
Analysis of VoIP Traffic in WiMAX Environment
 
A Hybrid Cloud Approach for Secure Authorized De-Duplication
A Hybrid Cloud Approach for Secure Authorized De-DuplicationA Hybrid Cloud Approach for Secure Authorized De-Duplication
A Hybrid Cloud Approach for Secure Authorized De-Duplication
 
Aging protocols that could incapacitate the Internet
Aging protocols that could incapacitate the InternetAging protocols that could incapacitate the Internet
Aging protocols that could incapacitate the Internet
 
A Cloud Computing design with Wireless Sensor Networks For Agricultural Appli...
A Cloud Computing design with Wireless Sensor Networks For Agricultural Appli...A Cloud Computing design with Wireless Sensor Networks For Agricultural Appli...
A Cloud Computing design with Wireless Sensor Networks For Agricultural Appli...
 
A CAR POOLING MODEL WITH CMGV AND CMGNV STOCHASTIC VEHICLE TRAVEL TIMES
A CAR POOLING MODEL WITH CMGV AND CMGNV STOCHASTIC VEHICLE TRAVEL TIMESA CAR POOLING MODEL WITH CMGV AND CMGNV STOCHASTIC VEHICLE TRAVEL TIMES
A CAR POOLING MODEL WITH CMGV AND CMGNV STOCHASTIC VEHICLE TRAVEL TIMES
 
Sustainable Construction With Foam Concrete As A Green Green Building Material
Sustainable Construction With Foam Concrete As A Green Green Building MaterialSustainable Construction With Foam Concrete As A Green Green Building Material
Sustainable Construction With Foam Concrete As A Green Green Building Material
 
USE OF ICT IN EDUCATION ONLINE COMPUTER BASED TEST
USE OF ICT IN EDUCATION ONLINE COMPUTER BASED TESTUSE OF ICT IN EDUCATION ONLINE COMPUTER BASED TEST
USE OF ICT IN EDUCATION ONLINE COMPUTER BASED TEST
 
Textual Data Partitioning with Relationship and Discriminative Analysis
Textual Data Partitioning with Relationship and Discriminative AnalysisTextual Data Partitioning with Relationship and Discriminative Analysis
Textual Data Partitioning with Relationship and Discriminative Analysis
 
Testing of Matrices Multiplication Methods on Different Processors
Testing of Matrices Multiplication Methods on Different ProcessorsTesting of Matrices Multiplication Methods on Different Processors
Testing of Matrices Multiplication Methods on Different Processors
 
Survey on Malware Detection Techniques
Survey on Malware Detection TechniquesSurvey on Malware Detection Techniques
Survey on Malware Detection Techniques
 
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICESURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
 
SURVEY OF GLAUCOMA DETECTION METHODS
SURVEY OF GLAUCOMA DETECTION METHODSSURVEY OF GLAUCOMA DETECTION METHODS
SURVEY OF GLAUCOMA DETECTION METHODS
 
Survey: Multipath routing for Wireless Sensor Network
Survey: Multipath routing for Wireless Sensor NetworkSurvey: Multipath routing for Wireless Sensor Network
Survey: Multipath routing for Wireless Sensor Network
 
Step up DC-DC Impedance source network based PMDC Motor Drive
Step up DC-DC Impedance source network based PMDC Motor DriveStep up DC-DC Impedance source network based PMDC Motor Drive
Step up DC-DC Impedance source network based PMDC Motor Drive
 
SPIRITUAL PERSPECTIVE OF AUROBINDO GHOSH’S PHILOSOPHY IN TODAY’S EDUCATION
SPIRITUAL PERSPECTIVE OF AUROBINDO GHOSH’S PHILOSOPHY IN TODAY’S EDUCATIONSPIRITUAL PERSPECTIVE OF AUROBINDO GHOSH’S PHILOSOPHY IN TODAY’S EDUCATION
SPIRITUAL PERSPECTIVE OF AUROBINDO GHOSH’S PHILOSOPHY IN TODAY’S EDUCATION
 
Software Quality Analysis Using Mutation Testing Scheme
Software Quality Analysis Using Mutation Testing SchemeSoftware Quality Analysis Using Mutation Testing Scheme
Software Quality Analysis Using Mutation Testing Scheme
 
Software Defect Prediction Using Local and Global Analysis
Software Defect Prediction Using Local and Global AnalysisSoftware Defect Prediction Using Local and Global Analysis
Software Defect Prediction Using Local and Global Analysis
 
Software Cost Estimation Using Clustering and Ranking Scheme
Software Cost Estimation Using Clustering and Ranking SchemeSoftware Cost Estimation Using Clustering and Ranking Scheme
Software Cost Estimation Using Clustering and Ranking Scheme
 

Recently uploaded

complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...asadnawaz62
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxk795866
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
EduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AIEduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AIkoyaldeepu123
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
DATA ANALYTICS PPT definition usage example
DATA ANALYTICS PPT definition usage exampleDATA ANALYTICS PPT definition usage example
DATA ANALYTICS PPT definition usage examplePragyanshuParadkar1
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfme23b1001
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfROCENODodongVILLACER
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxKartikeyaDwivedi3
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...Chandu841456
 

Recently uploaded (20)

complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Serviceyoung call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
EduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AIEduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AI
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
DATA ANALYTICS PPT definition usage example
DATA ANALYTICS PPT definition usage exampleDATA ANALYTICS PPT definition usage example
DATA ANALYTICS PPT definition usage example
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdf
 
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes  examplesPOWER SYSTEMS-1 Complete notes  examples
POWER SYSTEMS-1 Complete notes examples
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdf
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...
 

DETECTING NETWORK ANOMALIES USING CUSUM and FCM

  • 1. Scientific Journal Impact Factor (SJIF): 1.711 International Journal of Modern Trends in Engineering and Research www.ijmter.com @IJMTER-2014, All rights Reserved 89 e-ISSN: 2349-9745 p-ISSN: 2393-8161 DETECTING NETWORK ANOMALIES USING CUSUM and FCM E.M. Roopa Devi1 , R.C.Suganthe2 , B.Bhuvaneswari3 1,2,3 Department of Information Technology, kongu Engineering College Abstract - The network intrusion detection techniques are important to prevent our systems and networks from malicious behaviors. However, traditional network intrusion prevention such as firewalls, user authentication and data encryption have failed to completely protect networks and systems from the increasing and sophisticated attacks and malwares. Two anomaly detection techniques – CUSUM and clustering are used to find network anomalies. CUSUM detect changes based on the cumulative effect of the changes made in the random sequence instead of using a single threshold to check every variable. It involves calculating cumulative sum and determining whether a packet is normal or not. The FCM algorithm employs fuzzy partitioning such that a data point can belong to all groups with different membership grades. Together, CUSUM and FCM become a good technique in detecting network anomalies with a very less false alarm rate. Keywords- Network Security , Intrusion detection system, Feature selection , Data Mining,Fuzzy c- mean Clustering, KDD’99 dataset I. INTRODUCTION Early Internet architecture design goals did not put security as a high priority. However, today Internet security is a quickly growing concern. The prevalence of Internet attacks has increased significantly, but still the challenge of detecting such attacks generally falls on the end hosts and service providers, requiring system administrators to detect and block attacks on their own. In particular, as social networks have become central hubs of information and communication, they are increasingly the target of attention and attacks. Thus a challenge of carefully distinguishing malicious connections from normal ones is created. Previous work has shown that for a variety of Internet attacks, there is a small subset of connection measurements that are good indicators of whether a connection is part of an attack or not. These security issue creates the challenge for system administrators to distinguish normal connections of legitimate users from malicious connections. An administrator, in the face of an attack, wants to block such malicious connections without blocking legitimate users. One can never know for sure if any given connection is legitimate or malicious, but one can attempt to isolate a set of connections that stand out from normal user behaviour, so as to help system administrators detect attacks which is done by a network intrusion detection system. 1.1 INTRUSION DETECTION SYSTEM An intrusion detection system (IDS) monitors network traffic and monitors for suspicious activity and alerts the system or network administrator. As shown in Figure 1.1, in some cases the IDS may also respond to anomalous or malicious traffic by taking action such as blocking the user or source IP address from accessing the network. IDS come in a variety of “flavours” and approach the goal of detecting suspicious traffic in different ways. There are network based (NIDS) and host based (HIDS)
  • 2. International Journal of Modern Trends in Engineering and Research (IJMTER) Volume 01, Issue 06, [December - 2014] e-ISSN: 2349-9745, p-ISSN: 2393-8161 @IJMTER-2014, All rights Reserved 90 intrusion detection systems. There are IDS that detect based on looking for specific signatures of known threats- similar to the way antivirus software typically detects and protects against malware- and there are IDS that detect based on comparing traffic patterns against a baseline and looking for anomalies. There are IDS that simply monitor and alert and there are IDS that perform an action or actions in response to a detected threat. Figure 1.1 An Intrusion Detection System Two types of intrusion detection systems are Misuse Intrusion Detection-Misuse or Signature intrusion detection refers to intrusion that follows well-defined patterns of attack that exploit weaknesses in system and application software. Such patterns can be precisely written in advance. Anomaly Intrusion Detection -An IDS which is anomaly based will monitor network traffic and compare it against an established baseline. The baseline will identify what is “normal” for that network- what sort of bandwidth is generally used, what protocols are used, what ports and devices generally connect to each other- and alert the administrator or user when traffic is detected which is anomalous, or significantly different, than the baseline.
  • 3. International Journal of Modern Trends in Engineering and Research (IJMTER) Volume 01, Issue 06, [December - 2014] e-ISSN: 2349-9745, p-ISSN: 2393-8161 @IJMTER-2014, All rights Reserved 91 II. EXISTING SYSTEM Different terminologies are used in various applications, such as Novelty or surprise detection and fault detection. Novelty detection is a useful technique in cases where an important class of data is represented in training set. This means that the performance of the network will be poor for those classes. If the training data only consists of examples from one class and the test data contains examples from two or more classes, the classification task is called anomaly detection or novelty detection. With enterprise networks, network analysers are often attached to the lines in order to monitor traffic and send an alarm when disruptions are detected. Gunes Kayacik et al., (2010), KDD means Knowledge discovery and data mining. It is collection of various datasets. KDD Cup 99 dataset consists of network based datasets which was used as training set for creating a IDS Model using cascaded classification technique. The NSL-KDD is the new version KDD’99 data set. It solves some of the inherent problems of the KDD’99 data set. It can be applied to an effective data set to help researchers compare different intrusion detection methods. It runs the experiment on the complete set without the need to randomly select a small portion. In the existing system, Intrusion detection systems have been used to detect known attacks by matching misused traffic patterns or signatures. A class of IDS that leverages machine learning can also detect unknown attacks by identifying abnormal network traffic that deviates from the so-called “normal” behavior previously profiled during the IDS training phase. Most of intrusion detection systems nowadays rely on handcrafted signatures just like anti-viruses which have to be updated continuously in order to be effective against new attacks. III. PROPOSED SYSTEM The main of the he proposed system is to provide a hybrid framework combining the two anomaly detectors namely CUSUM and Fuzzy C-means clustering technique. KDD Cup 99 dataset consists of network based datasets. This dataset is used as an input for the process. Cumulative Sum algorithm (CuSum) is used to detect anomalies based on statistical information of packets in the networks. In brief, CUSUM detect changes based on the cumulative effect of the changes made in the random sequence instead of using a single threshold to check every variable. CUSUM is a broadly adopted algorithm for detection of abrupt traffic flow change, especially for DoS packet flooding. CUSUM is good at detecting the abrupt change of the mean of an observed sequence. By adjusting parameters of CUSUM, one can make trade off between the detection sensitivity and the degree of noise-resilience in an anomaly detection system. Unlike crisp clustering that crisply assigns each data point to a separate cluster, fuzzy clustering allows each data point to belong to various clusters with different membership degrees (or weights). Fuzzy clusters are expressed by their centers (or centroids) that are simultaneously found in the partitioning process of a fuzzy clustering algorithm. The number of clusters is often inputted as a parameter to a fuzzy clustering algorithm. 3.1 MODULES DESCRIPTION The proposed system considers the three sub processes. They are as follows: • Feature Selection • CUSUM • Clustering
  • 4. International Journal of Modern Trends in Engineering and Research (IJMTER) Volume 01, Issue 06, [December - 2014] e-ISSN: 2349-9745, p-ISSN: 2393-8161 @IJMTER-2014, All rights Reserved 92 Figure 3.1 System Flow Diagram 3.1.1 Feature Selection The KDD 99 intrusion detection datasets are based on the 1998 DARPA initiative, which provides designers of intrusion detection systems (IDS) with a benchmark on which to evaluate different methodologies. The raw data collected is usually substantially large, so it is desired that one select a subset of this data by creating feature vectors that represent most of the information we need from the data. There are 41 features in the KDD Cup 99 dataset, out of which 11 features are selected here. The selected features are: Duration, Protocol Type, Service, Flag, Count, Src_bytes, Dets_bytes, Land, Urgent, Wrong fragment, Logged in. All these features belong to the intrinsic attributes. Feature selection is done for selecting a subset of relevant features for use in a dataset. The central assumption when using a feature selection technique is that the data contains many redundant or irrelevant features. Redundant features are those which provide no more information than the currently selected features, and irrelevant features provide no useful information in any context. Feature selection returns a subset of the features. Selections of these features provide two main benefits: shorter training times,Eliminate features with less or no predictive information. 3.1.2 CUSUM A procedure, named Change-Point Detection designed to detect the change point of a network behaviour, is as follows. First, compare observed event sequence with user profiles. If any difference is significant, identify the time point the change happens so as to real time discover when the attack starts. Second, CUSUM is deployed to sequentially monitor input random variables. A simple parametric approach is often too simple to accurately model a network session due to the complexity of Internet. CUSUM with the characteristics of sequential and nonparametric light computation load can make IDS work online.
  • 5. International Journal of Modern Trends in Engineering and Research (IJMTER) Volume 01, Issue 06, [December - 2014] e-ISSN: 2349-9745, p-ISSN: 2393-8161 @IJMTER-2014, All rights Reserved 93 In statistical quality control, the CUSUM (or cumulative sum control chart) is a sequential analysis technique used for monitoring change detection. CUSUM involves the calculation of a cumulative sum and it can determine if a node is a zombie or not. The CUSUM algorithm is an approach to detect a change of the mean value of a stochastic process and it is based on the fact that if a change occurs, the probability distribution of the random sequence will also be changed. Algorithm CuSum = 0 n = 0 Repeat n = n + 1 CuSum = CuSum + Xn If CuSum > ThresHold then Signal attack indication Until Finished The cusum value is initially initialised to zero. n is the packet number. The cumulative sum is calculated. A threshold value is set and when the cusum value exceeds the cumulative sum the packet could be considered as an attack packet or else it is ignored. 3.1.3 Clustering Cluster analysis is identifying such grouping (or clusters) in an unsupervised manners, in unsupervised approach are divides a set of objects into homogeneous groups. There have been many clustering algorithms scattered in publications in much diversified areas such as pattern recognition, artificial intelligence, information technology, image processing, biology, psychology, and marketing. Clustering algorithms can be classified into main two categories: hard clustering algorithms and fuzzy clustering algorithms. Unlike hard clustering algorithms, which require that each data point of the data set belong to one and only one cluster, fuzzy clustering algorithms allow a data point to belong to two or more clusters with different probabilities. Basically hard clustering has each document belongs to exactly one cluster. In hard clustering a hard partition of the dataset is made. The clustering algorithm employed here is called as the Fuzzy C-means algorithm (FCM). The FCM employs fuzzy partitioning such that a data point can belong to all groups with different membership grades between 0 and 1. Fuzzy C-means Clustering (FCM) is also known as Fuzzy ISODATA, is a clustering technique which is separated from hard k-means that employs hard partitioning.FCM is an iterative algorithm. The aim of FCM is to find cluster centers (centroid) that minimize a dissimilarity function. This algorithm works by assigning membership to each data point corresponding to each cluster center on the basis of distance between the cluster center and the data point. Fuzzy Clustering also called soft clustering. In fuzzy clustering fuzzy partition of the data set is made. Fuzzy clustering uses membership function in partition data set. To accommodate the introduction of fuzzy partitioning, the membership matrix (U) is randomly initialized. 1. Σc i=1 uij =1, for all j=1,......,n
  • 6. International Journal of Modern Trends in Engineering and Research (IJMTER) Volume 01, Issue 06, [December - 2014] e-ISSN: 2349-9745, p-ISSN: 2393-8161 @IJMTER-2014, All rights Reserved 94 This function is called membership function and its value between 0 and 1.To find the value of centroid (ci) with help of membership matrix (uij). Σn j=1 uij m Xj 2. ci = Σn j=1 uij m The dissimilarity function which is used in FCM is given Equation J(U,c1,c2,..,ce) = Σe i=1 Ji = = Σe i=1 Σn j=1 uij m d2 ij uij is between 0 and 1 dij is the Euclidian distance between ith centroid (ci) and jth data point ; where dij= √ Σni=1 (Xi – Ci)2 1 Uij = Σc k=1 (dij/ dkj)2/(m-1) If || U(k+1) – U(k) || < ε Then STOP; otherwise return to step 2. IV. RESULTS AND DISCUSSION The main performance measure for evaluating the intrusion detection model is detection rate. Detection rate is defined as how accurately the IDS classifies the test data set. Here CUSUM and Clustering algorithms are combined together for better efficiency. There are 11 attributes which are selected from 41 features of the KDD data set. There are around 494,020 records which is too large for our purpose. Hence a concise dataset 10% KDD Cup 99 is employed here. It could be seen that the CUSUM was able to detect around 1200 attack packets while FCM was able to find around 1450 packets which clearly shows that FCM is far better than that of CUSUM. A graph depicting the number of attack packets detected by each algorithm is shown here in Figure 4.1. Figure 4.1 No of attack packets detected
  • 7. International Journal of Modern Trends in Engineering and Research (IJMTER) Volume 01, Issue 06, [December - 2014] e-ISSN: 2349-9745, p-ISSN: 2393-8161 @IJMTER-2014, All rights Reserved 95 V. CONCLUSION AND FUTURE WORKS Intrusion Detection System plays an important role in computer security. IDS users relying on the IDS to protect their computers and networks demand that an IDS provide reliable and continuous detection service. However, many of the today’s anomaly detection methods generate high false and negatives. The CUSUM and Fuzzy C means algorithm is a good technique to address the problem. All anomaly-based intrusion detection system, work on the assumption that normal activities differ from the abnormal activities substantially. In the existing system, various other novel algorithms such as K-means are employed. Here, two algorithms based on CUSUM and Fuzzy C Means is used for analyzing the behavior in the intrusion detection are evaluated by experiments. The preliminary experiments with the KDD Cup 99 dataset have shown that this approach is able to effectively detect intrusive behavior. The results also show that a low false positive rate can be achieved. More change point detection algorithms like Shiryaev-Roberts procedure could also be added in order to minimize the false alarm rate. The proposed system is an applied for dataset. Online packets could be caught and could be fed as an input to the IDS using CUSUM and clustering. REFERENCES [1] Alexander G Tartakovsky, Aleksey S Polunchenko and Grigory Sokolov,‘Efficient Computer Network Anomaly Detection by Changepoint Detection Methods,’ IEEE Journal of Selected topics in Signal Processing, Vol. 7, No. 1, pp.4-11,2013. [2] Thatte G, Mitra U, and Heidemann J, ‘Parametric Methods For Anomaly Detection In Aggregate Traffic,’ IEEE/ACM Transactions on Networking, Vol. 19, No. 2, pp.512–525,2011 [3] Dash M and Liu H, ‘Feature Selection for Clustering,’ Proceedings of Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD), Vol. 5, No.8, pp.110–121,2000. [4] Wu Jain, Feng Guo Rui, ‘Intrusion Detection Based On Simulated Annealing And Fuzzy C-means Clustering,’ MINES International Conference, Vol. 2, No.1, pp.382-385,2009. [5] Hiren S, Jeffrey Ur, Anupam J, ‘Fuzzy Clustering for Intrusion Detection,’ The 12th IEEE International Conference on Fuzzy Systems, Vol.2, No.5 pp.1274-1278.2003.