oalogo2  

AUTHOR(S):

Seyed Mahmood Hashemi, Jingsha He

 

TITLE

Tuning FCM Parameters with AMOSA

pdf PDF

ABSTRACT

Clustering of attack patterns is used in intrusion detection and discussed in this paper. Fuzzy CMeans (FCM) is a popular method for clustering; the performance of FCM is depends to its parameters radically. In this paper, performance of FCM is evaluated with some Validity Indices and represented in a multi-objective optimization problem. Multi-Objective Simulated Annealing (AMOSA) has high power to solve multi-objective optimization problems, so it is used in this paper to tune the parameters of FCM.

KEYWORDS

Intrusion Detection, Clustering, FCM, Multi-Objective Optimization, AMOSA

REFERENCES  

[1]. Wuling Ren, Jinzhu Cao, Xianjie Wu, “Application of Network Intrusion Detection Based on Fuzzy C-Means Clustering Algorithm”, IEEE, 2009 Third International Symposium on Intelligent Information Technology Application, DOI 10.1109/IITA.2009.269

[2]. Wei Jiang, Min YAO, Jun YAN, “Intrusion Detection Based on Improved Fuzzy C-Means Algorithm”, IEEE, 2008 International Symposium on Information Science and Engineering, DOI 10.1109/ISISE.2008.17

[3]. Lawrence O. Hall, Dmitry Goldgof, “Convergence of the Single-Pass and Online Fuzzy C-Means Algorithm”, IEEE TRANSACTIONS ON FUZZY SYSTEMS, Vol. 19, No. 4, 2011

[4]. Yu Guan, Ali A. Gorbani, Nabil Belacel, “Y-MENAS: A CLUSTERING METHOD FOR INTRUCTION DETECTION”, CCECE 2003 CCGEI 2003, Montr´eal, May/mai 2003 0-7803-7781-8/03/$17.00 c 2003 IEEE

[5]. Peiyu LIU, Linshan DUAN, Xuezhi chi, Zhenfang ZHU, “An Improved Fuzzy C-Means Clustering Algorithm Based on Simulated Annealing”, 2013 10th International Conference on Fuzzy Systems and Knowledge Discovery (FSKD)

[6]. J. C. Bezdek, “Pattern Recognition with Fuzzy Objective Functions algorithms”, Plenum, New York, 1981

[7]. Xuanli Lisa Xie, Gerardo Beni, “A Validity Measure for Fuzzy Clustering”, IEEE Log Number 9142752, IEEE, TRANSCATIONS ON PATTERN ANALISYS AND MACHINE INTELLIGENCE, Vol. 13, No. 8, 1991

[8]. I. Gath, B. Geva, “Unsupervised Optimal Fuzzy Clustering”, IEEE, TRANSACTION ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, Vol. 11, No. 7, 1989

[9]. Jurgen Beringer, Eyke Hullermeier, “Adaptive Optimization of the Number of Clusters in Fuzzy Clustering”, 1-4244-1210- 2/07/$25.00 C 2007 IEEE.

[10]. M. Halkidi, Y. Batistakis, M. Vazigiannis, “Clustering algorithms and validity measures”, 0-7695-1218-6/01 $10.00 0 2001 IEEE

[11]. Hyun-Sook Rhee, Kyung-Whan Oh, “A Validity Measure for Fuzzy Clustering and Its Use in Selecting Optimal Number of Clusters”, 0-7803-3645-3/96 $5.00©1996 IEEE

[12]. G. V. Nadiamma, M. Hemalatha, “An Evaluation of Clustering Techniques over Intrusion Detection System”, ICACCI’12, August 3-5, 2012, Chennai, T Nadu, India. Copyright 2012 ACM 978-1-4503-1196- 0/12/08…$10.00.

[13]. Fangfei Wei, Qingshan Jiang, Liang Shi, Nannan Wu, “An Intrusion Detection System Based on the Clustering Ensemble”, 1-4244- 1035-5/07/$25.00 .2007 IEEE

[14]. Qu Zhiming, Wang Xiaoli, Study of Rough Set and Clustering Algorithm in Network Security Management”, IEEE, 2009 International Conference on Networks Security, Wireless Communication and Trusted Computing, DOI 10.1109/NSWCTC.2009.47

[15]. Ming-Chuan Hung, Don-Lin Yang, “An Efficient Fuzzy C-Means Clustering Algorithm”, 0-7695-1 119-8/01 $17.00 0 2001 IEEE

[16]. Shou Zhi-qin, Tao Jian-ping, Zhou Jian, “Appling Fuzzy C-Means Clustering Algorithm to Campus Network Security Assessment Based on Characteristics of Weighted Complex Network”, IEEE, 978-1-4244-5326-9/10/$26.00 ©2010 IEEE

[17]. Carlos A. Coello Coello, David A. Van Veldhuizen, Gary B. Lamont, “Evolutionary Algorithms for Solving Multi-Objective Problems”, Speringer, 2nd Ed., 2007, pp. 74

[18]. Sanghamitra Bandyopadhyay, Sriparna Saha, Ujjwal Maulik, Kalynmoy Deb, “A Simulated Annealing-Based Multi-Objective Optimization Algorithm: AMOSA”, IEEE, Vol. 12, Issue 3, ISSN 1089-778x, 2008

[19]. R. Babuska, H.B. verbuggen, “Constructing Fuzzy Model By Product Space Clustering”, Delft University of Technology, P.O. Box 5031, NL_2600 GA Delft, The Netherlands

[20]. Michio Sugeno, Takahiro Yasukawa, “A Fuzzy-Logic-Based Approach to Qualitative Modeling”, IEEE Transaction On Fuzzy Systems, VOL. 1, NO. 1, Feb 1993

[21]. KDD Cup 1999 Data, University of California, Irvine, http://kdd.ics.uci.edu/databases/kddcup99/kddcu p99.html, 1999.

[22]. Jin-Ho Chung, Kyeongcheol Yang, “kFold Cyclotomy and Its Application to Frequency-Hopping Sequences”, IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 57, NO. 4, APRIL 2011

[23]. Juan Diego Rodriguez, Aritz Perez, Jose Antonio Lozano, “Sensitivity Analysis of k-fold Cross Validation in Prediction Error Estimation”, IEEE TRANSACTION ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, VOL. 32, NO. 3, MARCH 2010

Cite this paper

Seyed Mahmood Hashemi, Jingsha He. (2016) Tuning FCM Parameters with AMOSA. International Journal of Computers, 1, 56-61

 

cc.png
Copyright © 2017 Author(s) retain the copyright of this article.
This article is published under the terms of the Creative Commons Attribution License 4.0