메뉴 건너뛰기




Volumn 149, Issue PC, 2015, Pages 1253-1269

A fuzzy anomaly detection system based on hybrid PSO-Kmeans algorithm in content-centric networks

Author keywords

Anomaly detection; Clustering analysis; Content centric networks; Fuzzy set; K means; Particle swarm optimization

Indexed keywords

COST FUNCTIONS; DENIAL-OF-SERVICE ATTACK; FUZZY NEURAL NETWORKS; FUZZY SETS; K-MEANS CLUSTERING; NETWORK SECURITY; PARTICLE SWARM OPTIMIZATION (PSO);

EID: 84912115872     PISSN: 09252312     EISSN: 18728286     Source Type: Journal    
DOI: 10.1016/j.neucom.2014.08.070     Document Type: Article
Times cited : (137)

References (68)
  • 4
    • 84912095799 scopus 로고    scopus 로고
    • Congestion control in content-centric networking using neural network
    • PARC, a Xerox company
    • M. Hovaidi Ardestani, A. Karami, P. Sarolahti, J. Ott, Congestion control in content-centric networking using neural network, in: CCNxCon 2013. PARC, a Xerox company, 2013.
    • (2013) CCNxCon 2013
    • Hovaidi Ardestani, M.1    Karami, A.2    Sarolahti, P.3    Ott, J.4
  • 6
    • 84884207884 scopus 로고    scopus 로고
    • Effects-based feature identification for network intrusion detection
    • Louvieris P., Clewley N., Liu X. Effects-based feature identification for network intrusion detection. Neurocomputing 2013, 121:265-273.
    • (2013) Neurocomputing , vol.121 , pp. 265-273
    • Louvieris, P.1    Clewley, N.2    Liu, X.3
  • 7
    • 84874742021 scopus 로고    scopus 로고
    • DoS and DDoS in Named-Data Networking
    • abs/1208.0952
    • P. Gasti, G. Tsudik, E. Uzun, L. Zhang, DoS and DDoS in Named-Data Networking. CoRR (2012), abs/1208.0952.
    • (2012) CoRR
    • Gasti, P.1    Tsudik, G.2    Uzun, E.3    Zhang, L.4
  • 9
    • 80955142722 scopus 로고    scopus 로고
    • Swarm intelligence in intrusion detection. a survey
    • Kolias C., Kambourakis G., Maragoudakis M. Swarm intelligence in intrusion detection. a survey. Comput. Secur. 2011, 30(8):625-642.
    • (2011) Comput. Secur. , vol.30 , Issue.8 , pp. 625-642
    • Kolias, C.1    Kambourakis, G.2    Maragoudakis, M.3
  • 10
    • 33750514606 scopus 로고    scopus 로고
    • Modeling intrusion detection system using hybrid intelligent systems
    • Peddabachigari S., Abraham A., Grosan C., Thomas J. Modeling intrusion detection system using hybrid intelligent systems. J. Netw. Comput. Appl. 2007, 30(1):114-132.
    • (2007) J. Netw. Comput. Appl. , vol.30 , Issue.1 , pp. 114-132
    • Peddabachigari, S.1    Abraham, A.2    Grosan, C.3    Thomas, J.4
  • 11
    • 34250315640 scopus 로고    scopus 로고
    • An overview of anomaly detection techniques. existing solutions and latest technological trends
    • Patcha A., Park J.M. An overview of anomaly detection techniques. existing solutions and latest technological trends. Comput. Netw. 2007, 51(12):3448-3470.
    • (2007) Comput. Netw. , vol.51 , Issue.12 , pp. 3448-3470
    • Patcha, A.1    Park, J.M.2
  • 12
    • 77956393826 scopus 로고    scopus 로고
    • Network anomaly detection through nonlinear analysis
    • Palmieri F., Fiore U. Network anomaly detection through nonlinear analysis. Comput. Secur. 2010, 29:737-755.
    • (2010) Comput. Secur. , vol.29 , pp. 737-755
    • Palmieri, F.1    Fiore, U.2
  • 13
    • 61749083929 scopus 로고    scopus 로고
    • Mcpad: a multiple classifier system for accurate payload-based anomaly detection
    • Perdisci R., Ariu D., Fogla P., Giacinto G., Lee W. Mcpad: a multiple classifier system for accurate payload-based anomaly detection. Comput. Netw. 2009, 53:864-881.
    • (2009) Comput. Netw. , vol.53 , pp. 864-881
    • Perdisci, R.1    Ariu, D.2    Fogla, P.3    Giacinto, G.4    Lee, W.5
  • 14
    • 80455177941 scopus 로고    scopus 로고
    • Towards cyber defense. research in intrusion detection and intrusion prevention systems
    • Faysel M.A., Haque S.S. Towards cyber defense. research in intrusion detection and intrusion prevention systems. Int. J. Comput. Sci. Netw. Secur. 2010, 10(7):316-325.
    • (2010) Int. J. Comput. Sci. Netw. Secur. , vol.10 , Issue.7 , pp. 316-325
    • Faysel, M.A.1    Haque, S.S.2
  • 15
    • 84887613816 scopus 로고    scopus 로고
    • Diversity measures for one-class classifier ensembles
    • Krawczyk B., Woźniak M. Diversity measures for one-class classifier ensembles. Neurocomputing 2014, 126:36-44.
    • (2014) Neurocomputing , vol.126 , pp. 36-44
    • Krawczyk, B.1    Woźniak, M.2
  • 16
    • 84884203185 scopus 로고    scopus 로고
    • Network anomaly detection with the restricted boltzmann machine
    • Fiore U., Palmieri F., Castiglione A., Santis A.D. Network anomaly detection with the restricted boltzmann machine. Neurocomputing 2013, 122(25):13-23.
    • (2013) Neurocomputing , vol.122 , Issue.25 , pp. 13-23
    • Fiore, U.1    Palmieri, F.2    Castiglione, A.3    Santis, A.D.4
  • 18
    • 79951747896 scopus 로고    scopus 로고
    • Explanations of unsupervised learning clustering applied to data security analysis
    • Corral G., Armengol E., Fornells A., Golobardes E. Explanations of unsupervised learning clustering applied to data security analysis. Neurocomputing 2009, 72(13-15):2754-2762.
    • (2009) Neurocomputing , vol.72 , Issue.13-15 , pp. 2754-2762
    • Corral, G.1    Armengol, E.2    Fornells, A.3    Golobardes, E.4
  • 19
    • 78650174100 scopus 로고    scopus 로고
    • A performance evaluation framework for association mining in spatial data
    • Wang Q., Megalooikonomou V. A performance evaluation framework for association mining in spatial data. Intell. Inf. Syst. 2010, 35(3):465-494.
    • (2010) Intell. Inf. Syst. , vol.35 , Issue.3 , pp. 465-494
    • Wang, Q.1    Megalooikonomou, V.2
  • 21
    • 84912087455 scopus 로고    scopus 로고
    • Choosing DBSCAN parameters automatically using differential evolution
    • (Published by Foundation of Computer Science, New York, USA)
    • Karami A., Johansson R. Choosing DBSCAN parameters automatically using differential evolution. Int. J. Comput. Appl. 2014, 91(7):1-11. (Published by Foundation of Computer Science, New York, USA).
    • (2014) Int. J. Comput. Appl. , vol.91 , Issue.7 , pp. 1-11
    • Karami, A.1    Johansson, R.2
  • 22
    • 37349047955 scopus 로고    scopus 로고
    • A hybridized approach to data clustering
    • Kao Y.T., Zahara E., Kao I.W. A hybridized approach to data clustering. Expert Syst. Appl. 2008, 34(3):1754-1762.
    • (2008) Expert Syst. Appl. , vol.34 , Issue.3 , pp. 1754-1762
    • Kao, Y.T.1    Zahara, E.2    Kao, I.W.3
  • 23
    • 35148867445 scopus 로고    scopus 로고
    • A genetic algorithm that exchanges neighboring centers for k-means clustering
    • Laszlo M., Mukherjee S. A genetic algorithm that exchanges neighboring centers for k-means clustering. Pattern Recognit. Lett. 2007, 28(16):2359-2366.
    • (2007) Pattern Recognit. Lett. , vol.28 , Issue.16 , pp. 2359-2366
    • Laszlo, M.1    Mukherjee, S.2
  • 24
    • 43249119791 scopus 로고    scopus 로고
    • An efficient k-means clustering algorithm
    • Zalik K.R. An efficient k-means clustering algorithm. Pattern Recognit. Lett. 2008, 29:1385-1391.
    • (2008) Pattern Recognit. Lett. , vol.29 , pp. 1385-1391
    • Zalik, K.R.1
  • 26
    • 0021202650 scopus 로고
    • K-means-type algorithms: a generalized convergence theorem and characterization of local optimality
    • Selim S.Z., Ismail M.A. K-means-type algorithms: a generalized convergence theorem and characterization of local optimality. IEEE Trans. Pattern Anal. Mach. Intell. 1984, 6(1):81-87.
    • (1984) IEEE Trans. Pattern Anal. Mach. Intell. , vol.6 , Issue.1 , pp. 81-87
    • Selim, S.Z.1    Ismail, M.A.2
  • 27
    • 84912131446 scopus 로고    scopus 로고
    • Data clustering for anomaly detection in content-centric networks
    • (Published by Foundation of Computer Science, New York, USA)
    • Karami A. Data clustering for anomaly detection in content-centric networks. Int. J. Comput. Appl. 2013, 81(7):1-8. (Published by Foundation of Computer Science, New York, USA).
    • (2013) Int. J. Comput. Appl. , vol.81 , Issue.7 , pp. 1-8
    • Karami, A.1
  • 28
    • 84888439861 scopus 로고    scopus 로고
    • Evolutionary k-means for distributed data sets
    • Naldi M., Campello R. Evolutionary k-means for distributed data sets. Neurocomputing 2014, 127:30-42.
    • (2014) Neurocomputing , vol.127 , pp. 30-42
    • Naldi, M.1    Campello, R.2
  • 30
    • 84888437077 scopus 로고    scopus 로고
    • Particle swarm optimization for construction of neural network-based prediction intervals
    • Quan H., Srinivasan D., Khosravi A. Particle swarm optimization for construction of neural network-based prediction intervals. Neurocomputing 2014, 127:172-180.
    • (2014) Neurocomputing , vol.127 , pp. 172-180
    • Quan, H.1    Srinivasan, D.2    Khosravi, A.3
  • 33
    • 0003578015 scopus 로고
    • Edward Arnold / Halsted Press, London
    • Everitt B.S. Cluster Analysis 1993, Edward Arnold / Halsted Press, London. 3rd ed.
    • (1993) Cluster Analysis
    • Everitt, B.S.1
  • 36
    • 84874514225 scopus 로고    scopus 로고
    • Hybrid clustering algorithm based on pso with the multidimensional asynchronism and stochastic disturbance method
    • Chen J. Hybrid clustering algorithm based on pso with the multidimensional asynchronism and stochastic disturbance method. J. Theor. Appl. Inf. Technol. 2012, 46(1):434-440.
    • (2012) J. Theor. Appl. Inf. Technol. , vol.46 , Issue.1 , pp. 434-440
    • Chen, J.1
  • 38
    • 33750998476 scopus 로고    scopus 로고
    • Document clustering analysis based on hybrid pso+k-means algorithm
    • Cui X., Potok T.E. Document clustering analysis based on hybrid pso+k-means algorithm. J. Comput. Sci. 2005, 27-33.
    • (2005) J. Comput. Sci. , pp. 27-33
    • Cui, X.1    Potok, T.E.2
  • 41
    • 84886396936 scopus 로고    scopus 로고
    • A lightweight mechanism for detection of cache pollution attacks in named data networking
    • Conti M., Gasti P., Teoli M. A lightweight mechanism for detection of cache pollution attacks in named data networking. Comput. Netw. 2013, 57(16):3178-3191.
    • (2013) Comput. Netw. , vol.57 , Issue.16 , pp. 3178-3191
    • Conti, M.1    Gasti, P.2    Teoli, M.3
  • 43
    • 84861616701 scopus 로고    scopus 로고
    • Enhancing cache robustness for content-centric networking
    • M. Xie, I. Widjaja, H. Wang, Enhancing cache robustness for content-centric networking, in: INFOCOM, 2012, pp. 2426-2434.
    • (2012) INFOCOM , pp. 2426-2434
    • Xie, M.1    Widjaja, I.2    Wang, H.3
  • 47
    • 84912139058 scopus 로고    scopus 로고
    • Poseidon: mitigating interest flooding DDoS attacks in named data networking
    • abs/1303.4823
    • A. Compagno, M. Conti, P. Gasti, G. Tsudik, Poseidon: mitigating interest flooding DDoS attacks in named data networking. CoRR (2013), abs/1303.4823.
    • (2013) CoRR
    • Compagno, A.1    Conti, M.2    Gasti, P.3    Tsudik, G.4
  • 53
    • 0033666935 scopus 로고    scopus 로고
    • Comparing inertia weights and constriction factors in particle swarm optimization
    • R.C. Eberhart, Y. Shi, Comparing inertia weights and constriction factors in particle swarm optimization, in: Proceedings of the Evolutionary Computation, vol. 1, 2000, pp. 84-88.
    • (2000) Proceedings of the Evolutionary Computation , vol.1 , pp. 84-88
    • Eberhart, R.C.1    Shi, Y.2
  • 54
    • 84875089050 scopus 로고    scopus 로고
    • Boundary handling approaches in particle swarm optimization
    • N. Padhye, K. Deb, P. Mittal, Boundary handling approaches in particle swarm optimization, in: BIC-TA (1), 2012, pp. 287-298.
    • (2012) BIC-TA , Issue.1 , pp. 287-298
    • Padhye, N.1    Deb, K.2    Mittal, P.3
  • 57
    • 84888431725 scopus 로고    scopus 로고
    • Agreement-based fuzzy c-means for clustering data with blocks of features
    • Izakian H., Pedrycz W. Agreement-based fuzzy c-means for clustering data with blocks of features. Neurocomputing 2014, 127:266-280.
    • (2014) Neurocomputing , vol.127 , pp. 266-280
    • Izakian, H.1    Pedrycz, W.2
  • 58
    • 70350134739 scopus 로고    scopus 로고
    • The use of computational intelligence in intrusion detection systems: a review
    • Wu S.X., Banzhaf W. The use of computational intelligence in intrusion detection systems: a review. J. Appl. Soft Comput. 2010, 10:1-35.
    • (2010) J. Appl. Soft Comput. , vol.10 , pp. 1-35
    • Wu, S.X.1    Banzhaf, W.2
  • 62
    • 84912059079 scopus 로고    scopus 로고
    • Utilization of multi attribute decision making techniques to integrate automatic and manual ranking of options
    • Karami A., Johansson R. Utilization of multi attribute decision making techniques to integrate automatic and manual ranking of options. J. Inf. Sci. Eng. 2014, 30(2):519-534.
    • (2014) J. Inf. Sci. Eng. , vol.30 , Issue.2 , pp. 519-534
    • Karami, A.1    Johansson, R.2
  • 65
    • 84885774862 scopus 로고    scopus 로고
    • A framework for constructing features and models for intrusion detection systems
    • Lee W., Stolfo S.J. A framework for constructing features and models for intrusion detection systems. ACM Trans. Inf. Syst. Secur. 2000, 3(4):227-261.
    • (2000) ACM Trans. Inf. Syst. Secur. , vol.3 , Issue.4 , pp. 227-261
    • Lee, W.1    Stolfo, S.J.2
  • 67
    • 0031191630 scopus 로고    scopus 로고
    • The use of the area under the ROC curve in the evaluation of machine learning algorithms
    • Bradley A. The use of the area under the ROC curve in the evaluation of machine learning algorithms. Pattern Recognit. 1997, 30(7):1145-1159.
    • (1997) Pattern Recognit. , vol.30 , Issue.7 , pp. 1145-1159
    • Bradley, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.