You are on page 1of 6

This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts

for publication in the IEEE Globecom 2010 proceedings.

Networking Anomaly Detection using DSNS and


Particle Swarm Optimization with Re-Clustering
Moisés F. Lima∗ , Lucas D. H. Sampaio∗ , Bruno B. Zarpelão† , Joel J. P. C. Rodrigues‡ , Taufik Abrão∗ and
Mario Lemes Proença Jr.∗
∗ ComputingScience Department, State University of Londrina (UEL), Londrina, Brazil
† School
of Elect. & Comp. Engineering, University of Campinas (UNICAMP), Campinas, Brazil
‡ Instituto de Telecomunicações, University of Beira Interior, Covilhã, Portugal
E-mails: {moisesflima, lucas.dias.sampaio, brunozarpelao}@gmail.com, joeljr@ieee.org, {taufik, proenca}@uel.br

Abstract—This paper presents an anomaly detection method In this work, we propose a data mining based anomaly
using Digital Signature of Network Segment (DSNS) and Par- detection system, aiming to detect volume anomalies, using
ticle Swarm Optimization-based clustering (PSO-Cls). The PSO Simple Network Management Protocol (SNMP) monitoring.
algorithm is an evolutionary computation technique whose main
characteristics include low computational complexity, ability to The method is novel in terms of combining the use of Digital
escape from local optima, and small number of input parameters Signature of Network Segment (DSNS) [4] with the evolution-
dependence, when compared to other evolutionary algorithms, ary technique called Particle Swarm Optimization (PSO) [5]
e.g. genetic algorithms (GA). In the PSO-Cls algorithm, swarm and K-means clustering algorithm [6], applied in a real data
intelligence is combined with K-means clustering, in order to set.
achieve high convergence rates. On the other hand, DSNS consists
of normal network traffic behavior profiles, generated by the PSO is a high efficient heuristic technique with low computa-
application of Baseline for Automatic Backbone Management tional complexity, developed in 1995 by Kennedy and Eberhart
(BLGBA) model in SNMP historical network data set. The [5] inspired by social behavior of bird flocking. The DSNS is a
proposed approach identifies and classifies data clusters from baseline that consists of different normal behavior profiles to a
DSNS and real traffic, using swarm intelligence. Anomalous specific network device or segment, generated by the GBA tool
behaviors can be easily identified by comparing real traffic and
cluster centroids. Tests were performed in the network of State (Automatic Backbone Management) [4], using data collected
University of Londrina and the obtained detection and false alarm from SNMP objects. The proposed anomaly detection system
rates are promising. uses the K-means algorithm in order to clusterize the traffic
Index Terms—Anomaly detection, PSO, Baseline, DSNS, K- collected by SNMP agents and its respective DSNS. The PSO
means clustering algorithm. is combined with the K-means in order to improve performance
and quality of the solution in the clusterization and calculation
I. I NTRODUCTION of clusters centroids.
Continuous advances in communication technology have Tests were carried out using a real network environment
driven the creation of a wide services variety on the communi- in the State University of Londrina (UEL), Brazil. Numerical
cation networks. However, maintain the proper functioning of results have been shown that the obtained detection and false
these networks has become a difficult task due to the large alarm rates are promising. We also implemented the determin-
traffic volume carried. Thus, automating management tasks istic method proposed in [2] in order to detect anomalies on
such as anomaly detection are essential to ensure information the same dataset, so that both methods could be compared.
security and resources availability. Network anomalies impact This paper is organized as follows. The Section II presents
on the quality of services provided, resulting in degradation related works on the network anomalies. The traffic model
of network performance and even in the interruption of its characterization is detailed in Section III. Section IV describes
operations [1] [2]. the swarm optimization aspects. Section V details the proposed
Historically, methods for detecting anomalies are divided anomaly detection approach, while Section VI discusses the
into two categories. Signature-based anomaly detection systems adopted tests setup and the respective performance results.
search for previously known anomaly patterns in network Finally, the main conclusions and future work are offered in
traffic. On the other hand, profile-based systems create models Section VII.
that represent the normal behavior of network. Anomalies are
detected when real traffic deviates from the expected behavior. II. RELATED W ORK
Despite usually presenting high false alarm rates, methods Several studies have been conducted in order to propose effi-
based on normal profiles are more promising due to their cient approaches for detection and classification of anomalies.
flexibility and the ability to detect new types of anomalies. The The establishment of a normal model and the need of increasing
main techniques used in profile-based systems are: statistical anomaly detection rate with lower false alarm rate are still
models, data-mining and machine learning [3]. challenging tasks. In recent years, several works such as [7]–[9]

978-1-4244-5638-3/10/$26.00 ©2010 IEEE


This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the IEEE Globecom 2010 proceedings.

were developed in the area of anomaly detection. Though using each day of the week, meeting this requirement. These behavior
different approaches, they have the same goal of maximizing profiles are named Digital Signature of Network Segment
the detection rate while minimizing the rate of false alarms. (DSNS), proposed by Proença in [4] and applied to anomaly
Ensafi et al. [10] proposed the use of K-means as an detection with great results in [2].
anomaly detection method. In order to address the local con- Hence, the BLGBA algorithm was developed based on a
vergence problem and high false alarm rate originated by K- variation in the calculation of statistical mode. In order to
means algorithm, the authors combined two techniques of soft determine an expected value to a given second of the day, the
computing: fuzzy logic and swarm intelligence. The proposed model analyzes the values for the same second in previous
method consists of two phases: training phase, which the better weeks. These values are distributed in frequencies, based on
particle throughout the generations is able to be found, and the the difference between the greatest Gaj and the smallest
detection phase, which uses the Euclidean distance between Saj element of the sample, using 5 classes. This difference,
the cluster centroid and the input data to verify if a real divided by five, forms the amplitude h between the classes,
traffic point is normal or anomalous. Tests were conducted h = (Gaj − Saj )/5. Then, the limits of each LCk class are
using the classical training dataset KDDCup99 [11]. Results obtained. They are calculated by LCk = Saj + h ∗ k, where
indicated that the method presents some capability for detecting Ck represents the k class (k = 1 . . . 5). The value that is
anomalies, despite revealing high false alarm rates. the greatest element inserted in the class with accumulated
In [12], Ma et al. propose a Radial Basis Function neural frequency equal or greater than 80% is included in DSNS.
network (RBFNN) for network anomaly detection. The method The samples for the generation of DSNS are collected second
consists in embed a radial basis function in a two-layer feed- by second along the day, by the GBA tool. Two types of DSNS
forward neural network. It is very important to specify a strong are generated: the bl-7 consisting of one DSNS for each day
training algorithm, in order to find the neural network parame- of the week, and the bl-3 consisting of one DSNS for the
ters. Hence, a swarm intelligence technique, named Quantum- workdays, one for Saturday and another one for Sunday.
Behaved Particle Swarm Optimization (QPSO), is employed Figure 1 shows charts containing one week of monitoring
to train the RBF network. In order to improve the ability of UEL network. Data were collected from SNMP object
of QPSO to escape local optima, the authors associated the ipInReceives, at the University’s Web server in the period of
Quantum PSO with gradient descent (GD) algorithm forming 04/20/2009 to 04/26/2009. The data collected are represented
the QPSO-GD algorithm. Aiming to validate the proposed in green and the respective DSNS values by the blue line. The
approach, an experiment was conducted using the KDDCup99 charts show that traffic has a periodic behavior, where traffic
training dataset. Results showed that the hybrid QPSO-GD- levels are higher during the working hours, from 8 a.m. to 6
RBFNN is a stronger optimizer than QPSO and GD algorithm p.m. It is possible to observe a great adjustment between the
implemented separately for training the RBFNN. behavior of real traffic and the DSNS.
Zarpelão et al. [2] proposed a normal profile-based anomaly
IV. PARTICLE S WARM O PTIMIZATION AND K- MEANS
detection system, using data collected from SNMP objects for
CLUSTERING
volume anomaly detection. The method applies simple parame-
terized deterministic algorithms over data collected from SNMP The PSO is an evolutionary computation technique created
objects and their normal behavior profiles generated by the by Kennedy and Eberhart [5] in 1995, based on birds social
GBA tool (Automatic Backbone Management) [4]. Behavior behavior. PSO is powerful since it is able to escape from global
deviations detected in different SNMP objects are correlated optima while keeps a simple structure. Unlike GA algorithm,
by using a dependency graph, which represents the relation- PSO does not use operators like recombination and mutation,
ships between the monitored objects. Satisfactory results were which contributes to the complexity reduction, but not reduces
achieved in the experiments performed on the UEL network. its efficiency. On the other hand, K-means is a clustering
In many test cases, detection and false alarm rates were better algorithm used in solving the well known clustering problem
than the goals required by the network administrator. Hence, in and it is classified as a method of unsupervised learning, aiming
this work we present a performance comparison between our to classify a dataset into clusters, so that each data point is
proposal and the deterministic algorithm suggested in [2]. classified as belonging to the cluster with the closer mean
[13]. While K-means is classified as a simple algorithm, it
III. T RAFFIC C HARACTERIZATION : BLGBA AND DSNS suffers from the absence of diversity mechanism to escape
The first step to detect anomalies is to adopt a model that from local optimum. In order to overcome this drawback and
characterizes the network traffic efficiently, which represents simultaneously keeps computational complexity under control,
a significant challenge due to the non-stationary nature of mainly because for high-dimensional problems complexity is a
network traffic. Large networks traffic behavior is composed by concern, the K-means algorithm can be associated to PSO [13],
daily cycles, where traffic levels are usually higher in working resulting in the PSO-Cls algorithm.
hours and are also distinct for workdays and weekends. So In PSO, the solutions in the search space are called particles.
an efficient traffic characterization model should be able to Each particle has a fitness value, which is measured by the
trustworthily represent these characteristics. Thus, the GBA tool function to be optimized, and a speed that drives its flight,
is used to generate different profiles of normal behavior for moving through space in search of the problem’ best solution.

978-1-4244-5638-3/10/$26.00 ©2010 IEEE


This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the IEEE Globecom 2010 proceedings.

Fig. 1. Week of traffic from 04/20/2009 to 04/26/2009 of ipInReceives SNMP object, on Web-Server of State University of Londrina.

The PSO principle is the movement of a group of particles, the inertia weight; Ui1 [n] and Ui2 [n] are diagonal matrices
randomly distributed in the search space, each one with its with dimension D, and elements are random variables with
own position and velocity. The position of each particle is uniform distribution ∼ U ∈ [0, 1], generated for the ith
modified by the application of velocity in order to reach a better particle at iteration n = 1, 2, . . . , N; pbest
g and pbest
i are
performance [5]. The interaction among particles is inserted in the best global position and the best local positions found
the calculation of particle velocity. Hence, at each iteration, the until the nth iteration, respectively; φ1 and φ2 are acceleration
speed and position of all particles from a population of size M coefficients regarding the best particles and the best global
are updated. If the best values for local or global solutions positions influences in the velocity updating, respectively.
were founded, the respective best candidate-vector is updated,
where pbest is the best value obtained so far by each particle in
i vi [n + 1] = ω · vi [n] + φ1 · Ui1 [n](pbest
i − pi [n]) +
the population of size M , and pbest
g is the best value obtained best
by all particle so far. The best local and global particles are φ2 · Ui2 [n](pg − pi [n]) (1)
column-vectors wise, with dimension D.
In the PSO strategy, each candidate-vector at nth itera- The ith particle’s position at iteration n is a clustering
tion, defined as pi [n] with D × 1 dimension, is used for candidate-vector pi [n] of size D × 1. The position of each
the velocity calculation of next iteration as (1), where ω is particle is updated using the new velocity vector (1) for that

978-1-4244-5638-3/10/$26.00 ©2010 IEEE


This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the IEEE Globecom 2010 proceedings.

particle, according to (2).


pi [n + 1] = pi [n] + vi [n + 1], i = 1, . . . , M (2)
The PSO algorithm consists of repeated application of the
velocity and position updating equations until a stop criteria is
found. The stop criteria can be a fixed number of iteration or
determined by the non-improvement in the solution when the
algorithm evolves.
In order to reduce the likelihood that the particle might leave
the search universe, maximum velocity Vm factor is added to
the PSO model (1), which will be responsible for limiting the
velocity in the range [±Vm ]. The adjustment of velocity allows
the particle to move in a continuous but constrained subspace,
been simply accomplished by (3).
Fig. 2. Proposed anomaly detection system model.
vi [n] = min {Vm ; max {−Vm ; vi [n]}} (3)
From (3) it is clear that if |vi [n]| exceeds a positive constant 2. The PSO Alarm system is responsible for analyzing the
value Vm specified by the user, the ith particle’ velocity is results generated by the previous step, verifying if there were
assigned to be sign(vi [n])Vm , i.e. particles velocity on each of anomalies in the analyzed interval. The PSO Alarm system
D−dimension is clamped to a maximum magnitude Vm . If we checks how close each sample of traffic movement is from
could define the search space by the bounds [Pmin ; Pmax ], then their corresponding cluster centroid. The distance measure
the value of Vm will be typically set to Vm = τ (Pmax − Pmin ), adopted in this work is the Euclidean distance, which consists
where 0.1 ≤ τ ≤ 1.0 [14]. of the straight line distance between two points. A sample
To elaborate further about the inertia weight, we note that a is considered anomalous if the Euclidian distance between it
relatively larger value of w is helpful for global optimum, and and their respective cluster centroid, exceeds a threshold value
lesser influenced by the best global and local positions1 , while λ. Then, PSO Alarm system triggers an alarm to notify the
a relatively smaller value for w is helpful for convergence, i.e., network administrator, according Algorithm 2.
smaller inertial weight encourages the local exploration as the
particles are more attracted towards pbesti and pbest
g [15]. In Algorithm 1 PSO-Cls Based Anomaly Detection
this work, for simplicity, we have adopted an unitary inertia Function PSO-Cls system
weight value. Input: real traffic, DSNS
Output: clustered traffic and DSNS, cluster centroids
V. N ETWORK A NOMALY D ETECTION MODEL BASED ON 1. Input data are clustered randomly
S WARM I NTELLIGENCE 2. Population is initialized uniformly distributed
in U [Pmin ; Pmax ]
The elements of the proposed network anomaly detection 3. For n = 1 to N
system can be seen in Figure 2. The GBA tool [4] is responsible For i = 1 to M
//velocity calculation
for the collection of real traffic samples and generation of the vi [n + 1] = ω · vi [n] + φ1 · Ui1 [n](pbest
i − pi [n]) +
DSNS. The PSO-Cls system calculates the cluster centroids φ2 · Ui2 [n](pbest
g − pi [n])
from real traffic and DSNS. Then, the PSO Alarm system can //speed bounds
analyze the distance between cluster centroids and real traffic vi [n] = min {Vm ; max {−Vm ; vi [n]}}
samples, aiming to find the existence of anomalies.
//update the position
The process for anomaly detection of the proposed system pi [n + 1] = pi [n] + vi [n + 1], i = 1, . . . , M
is divided into two stages, as follow:
If pi ∈ [Pmin ; Pmax ]
1. The PSO-Cls system groups traffic data is collected from
Calculate the fitness value of pi and Update pbest
SNMP objects and their respective DSNS every 300 seconds, and pbest
i
g
which are analyzed individually. Firstly, traffic data and DSNS endIf
from each 300-seconds interval are clustered simultaneously. endFor i
//K-means reclustering
Then, a centroid for each cluster found is calculated, which Input data is reassigned to clusters according to the
represents the expected behavior for the traffic samples of the nearest euclidean distance
cluster. The pseudo code used for clustering data and calculate Stop if N has been reached
endFor n
the centroids can be seen in Algorithm 1. The clustered data 4. pg determines the cluster Centroids
best

and clusters centroids generated in this stage are used in the End Function
next step. − − − − − − − − − − −−
Pmin , Pmax : minimum and maximum values of the input data
1 Analogous to the idea of the phenomenon that it is difficult to diverge
heavier objects in their flight trajectory than the lighter ones.

978-1-4244-5638-3/10/$26.00 ©2010 IEEE


This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the IEEE Globecom 2010 proceedings.

3500 3500 3500 3500


samples and cluster centroids
Euclidean Distances between

3000 3000 3000 3000

2500 2500 2500 2500

2000 2000 2000 2000

1500 1500 1500 1500


00:00 02:00 04:00 06:00 08:00 10:00 12:00 14:00 16:00 18:00 20:00 22:00 24:00 00:00 02:00 04:00 06:00 08:00 10:00 12:00 14:00 16:00 18:00 20:00 22:00 24:00 00:00 02:00 04:00 06:00 08:00 10:00 12:00 14:00 16:00 18:00 20:00 22:00 24:00 00:00 02:00 04:00 06:00 08:00 10:00 12:00 14:00 16:00 18:00 20:00 22:00 24:00
Monday − 04/20/2009 Tuesday − 04/21/2009 Wednesday − 04/22/2009 Thursday − 04/23/2009
3500 3500 3500
samples and cluster centroids
Euclidean Distances between

3000 3000 3000

2500 2500 2500

2000 2000 2000

1500 1500 1500


00:00 2:00 4:00 6:00 8:00 10:00 12:00 14:00 16:00 18:00 20:00 22:00 24:00 00:00 2:00 4:00 6:00 8:00 10:00 12:00 14:00 16:00 18:00 20:00 22:00 24:00 00:00 2:00 4:00 6:00 8:00 10:00 12:00 14:00 16:00 18:00 20:00 22:00 24:00
Friday − 04/24/2009 Saturday − 04/25/2009 Sunday − 04/26/2009

Fig. 3. Alarms for Week test from 04/20/2009 to 04/26/2009

Algorithm 2 PSO Alarm that not show significant variation between real traffic and
Function PSO Alarm system the DSNS, according (5). The variables used to calculate the
Input: clustered traffic and DSNS, cluster centroids
Output: detected anomalies detection and false alarm rate are:
X = clustered traffic and DSNS • correctly detected: number of anomalies that were cor-
Z = cluster centroids rectly detected.
For each sample x of X
If D(x, Z) < λ • occ anomalies: number of anomalies occurred in traffic.
x is normal • f alse positives: number of alarms that do not correspond
Else to an anomalous situation.
x is an anomaly, triggers an alarm
endIf • total alarms: number of generated alarms.
endFor
End Function detection rate = correctly detected/occ anomalies (4)
− − − − − − − − − − −−
D = euclidean distance, λ = maximum distance threshold false alarm rate = f alse positives/total alarms (5)
Aiming to validate the effectiveness of the proposed method,
tests have been performed throughout a week test (Figure 1)
VI. N UMERICAL R ESULTS of real data traffic generated in UEL network with different
values of λ, aiming find the best values for detection and
In order to validate our anomaly detection system, a real false alarm rates. Figure 3 shows the alarms generated by the
environment was used to test the system. Data used in the ex- proposed system, for each day of the week test. The y-axis
periment was collected during the 04/20/2009 to 04/26/2009 represents the Euclidean distances between samples and cluster
week, from ipInReceives objects of UEL main Web server. centroids, and x-axis the time they occurred. Figure 4 describes
ipInReceives determines the number of IP packets received by the performance of PSO-Cls algorithm in terms of the trade-off
the network element. Figure 1 presents charts with collected between detection and false alarm rates, given λ as a parameter.
data and its respective DSNS. One can observe that the suitable λ values on a ROC diagram
As seen in section V, for each traffic sample, PSO Alarm [16] are in the range λ ∈ [1350; 1800]. The results obtained
system calculates the Euclidean distance between incoming after 100 iterations of PSO-Cls algorithm for each value of
data sample and its respective cluster centroid, aiming to λ, confirm that the method is useful for anomaly detection,
verify whether the sample is anomalous. Every time the real achieving the best detection rate × false alarm rate, 99.13%
traffic shows a significant deviation from the DSNS, implies and 5.02% respectively, when λ = 1500.
in a substantial variation on the Euclidean distance values, It was also implemented a simplified version of the de-
characterizing a traffic volume anomaly. So, if this distance terministic network anomaly detection algorithm proposed in
exceed the λ threshold value, the PSO Alarm system triggers [2]. The method is based on the mechanism of hysteresis
an alarm to notify the network administrator. and uses a parameter called δ to reduce the possibility of
The evaluation of the proposed anomaly detection system is generating false alarms [2]. Experiments have been carried out
based on two performance metrics: the detection rate, which over entire data traffic from the considered week test, taking
consisting of the detection probability given by (4), and the into account different values of δ, in order to determine the
false alarm rate, which represents the probability of alarms trade-off between detection and false alarm rates. Figure 5

978-1-4244-5638-3/10/$26.00 ©2010 IEEE


This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the IEEE Globecom 2010 proceedings.

indicates that the deterministic algorithm is capable to achieve environment, showed that the method proposed in this work is
71.42% of detection rate and 5.71% of false alarm rate, when capable of increasing the detection rate, while reducing false
δ = 12. This δ value results in the best detection × false alarm alarms.
rate trade-off. Analyzing data collected from SNMP objects, the PSO-based
anomaly detection algorithm has been shown robustness against
false alarm while holds high anomaly detection rates, achieving
99.13 anomaly detection rate with 5.02 false alarm rate for
λ = 1500 threshold, confirming that the method is feasible for
anomaly detection.
Future work includes the application of the proposed model
on the simultaneous monitoring of several SNMP objects,
aiming the false alarm rate reduction through the correlation
of SNMP objects.

R EFERENCES
Fig. 4. Detection rate × false alarm rate and λ × false alarm rate for PSO-Cls [1] A. Kind, M. P. Stoecklin, and X. Dimitropoulos, “Histogram-based
algorithm. traffic anomaly detection,” in IEEE Transactions on Network Service
Management, vol. 6, no. 2, June 2009.
The comparison between the best results obtained by the [2] B. B. Zarpelão, L. S. Mendes, M. L. Proença Jr., and J. J. P. C. Rodrigues,
“Parameterized anomaly detection system with automatic configuration,”
anomaly detection method proposed in this work and the in GC’09 CSS. 2009 IEEE Global Communications Conference (IEEE
deterministic method proposed in [2], shows that the PSO-based GLOBECOM 2009), Communications Software and Services Symposium,
anomaly detection system has a gain of 27.71% in detection 2009.
[3] A. Patcha and J. M. Park, “An overview of anomaly detection techniques:
rate value and a reduction of 0.69% in the false alarm rate over Existing solutions and latest technological trends,” Computer Networks:
the deterministic method. These results confirm that the model The International Journal of Computer and Telecommunications Network-
proposed in this work is more suitable for anomaly detection ing, 2007.
[4] M. L. Proença Jr., C. Coppelmans, M. Botolli, and L. S. Mendes, Security
on a real network environment. and reliability in information systems and networks: Baseline to help with
network management. Springer, 2006, pp. 149–157.
[5] J. Kennedy and R. Eberhart, “Particle swarm optimization,” in IEEE
International Conference on Neural Networks, 1995, pp. 1942–1948.
[6] J. B. MacQueen, “Some methods for classification and analysis of mul-
tivariate observations,” in Proceedings of the Fifth Berkeley Symposium
on Mathematical Statistics and Probability, 1967, pp. 281–297.
[7] Y. ling Zhang, Z. guo Han, and J. xia Ren, “A network anomaly detection
method based on relative entropy theory,” in Proceedings of the 2009
Second International Symposium on Electronic Commerce and Security,
2009, pp. 231 – 235.
[8] L. Kuang and M. Zulkernine, “An anomaly intrusion detection method
using the csi-knn algorithm,” in Proceedings of the 2008 ACM symposium
on Applied computing, 2008, pp. 921 – 926.
[9] L. He, S. Yu, and M. Li, “Anomaly detection based on available
bandwidth estimation,” in Proceedings of the 2008 IFIP International
Conference on Network and Parallel Computing, 2008, pp. 176 – 183.
Fig. 5. Detection rate × false alarm rate and δ × false alarm rate for the [10] R. Ensafi, S. Dehghanzadeh, R. Mohammad, and T. Akbarzadeh, “Op-
deterministic network anomaly detection method. timizing fuzzy k-means for network anomaly detection using pso,” in
AICCSA 2008. IEEE/ACS International Conference on Computer Systems
and Applications, Apr. 2008, pp. 686 – 693.
Additionally in order to validate the choice of 300-seconds [11] KDD Cup 1999 Data. Available at
for the analysis interval as seen in section V, tests were http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.
performed with different interval sizes varying in the range of html.
[12] R. Ma, Y. Liu, X. Lin, and Z. Wang, “Network anomaly detection using
[50; 900] seconds, over the week test with λ ∈ [1350; 1800]. rbf neural network with hybrid qpso,” in IEEE International Conference
Results showed that when considering the trade-off between on Networking, Sensing and Control, Apr. 2008, pp. 1284 – 1287.
detection rate and false alarms rate the anomaly detection [13] L. Xiao, Z. Shao, and G. Liu, “K-means algorithm based on parti-
cle swarm optimization algorithm for anomaly intrusion detection,” in
system is more efficient using a 300-seconds interval, but could WCICA 2006 . The Sixth World Congress on Intelligent Control and
not be included in this work with complete proofs because of Automation, 2006, pp. 5854 – 5858.
lack of space. [14] N. Nedjah and L. M. Mourelle, Swarm Intelligent Systems. Springer-
Verlag Berlin Heidelberg: Springer, 2006.
[15] Y. Shi and R. C. Eberhart, “Parameter selection in particle swarm
VII. C ONCLUSION optimization,” in 1998 Annual Conference on Evolutionary Programming,
The experiments’ results, obtained by the combination of the San Diego, USA, March 1998.
[16] S. Axelsson, “The base-rate fallacy and the difficulty of intrusion de-
DSNS and the Particle Swarm optimization with re-clustering tection,” in ACM Transactions on Information and Systems Security 3,
applied to the anomaly detection problem in a real network vol. 1, May 2000, pp. 186 – 205.

978-1-4244-5638-3/10/$26.00 ©2010 IEEE

You might also like