DocumentCode :
2199374
Title :
Anomaly Detection Model Based on Bio-Inspired Algorithm and Independent Component Analysis
Author :
Srinoy, Surat ; Kurutach, Werasak
Author_Institution :
Suan Dusit Rajabhat Univ., Bangkok
fYear :
2006
fDate :
14-17 Nov. 2006
Firstpage :
1
Lastpage :
4
Abstract :
With the advent and explosive growth of the global Internet and electronic commerce environments, adaptive/automatic network/service intrusion and anomaly detection in wide area data networks and e-commerce infrastructures is fast gaining critical research and practical importance. In this paper we present independent component analysis (ICA) based feature selection heuristics approach to data clustering. Independent component analysis is used to initially create raw clusters and then these clusters are refined using parallel artificial immune recognition system (AIRS). AIRS that has been developed as an immune system techniques. The algorithm uses artificial immune system (AIS) principle to find good partitions of the data. Certain unnecessary complications of the original algorithm are discussed and means of overcoming these complexities are proposed. We propose parallel artificial immune recognition system (AIRS)) in the second stage for refinement mean of overcoming these complexities are proposed. Our approach allows us to recognize not only known attacks but also to detect suspicious activity that may be the result of a new, unknown attack. The experimental results on knowledge discovery and data mining-(KDDCup 1999)
Keywords :
Internet; artificial immune systems; data mining; electronic commerce; independent component analysis; security of data; wide area networks; ICA; adaptive-automatic network; anomaly detection model; artificial immune recognition system; bioinspired algorithm; data clustering; data mining; e-commerce infrastructure; electronic commerce environment; global Internet; independent component analysis; knowledge discovery; parallel AIRS; service intrusion; wide area data network; Adaptive systems; Clustering algorithms; Electronic commerce; Explosives; IP networks; Immune system; Independent component analysis; Intrusion detection; Partitioning algorithms; Web and internet services;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
TENCON 2006. 2006 IEEE Region 10 Conference
Conference_Location :
Hong Kong
Print_ISBN :
1-4244-0548-3
Electronic_ISBN :
1-4244-0549-1
Type :
conf
DOI :
10.1109/TENCON.2006.343996
Filename :
4142188
Link To Document :
بازگشت