Skip to main content
Erschienen in: EURASIP Journal on Wireless Communications and Networking 1/2018

Open Access 01.12.2018 | Research

An intrusion detection method for internet of things based on suppressed fuzzy clustering

verfasst von: Liqun Liu, Bing Xu, Xiaoping Zhang, Xianjun Wu

Erschienen in: EURASIP Journal on Wireless Communications and Networking | Ausgabe 1/2018

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In order to improve the effectiveness of intrusion detection, an intrusion detection method of the Internet of Things (IoT) is proposed by suppressed fuzzy clustering (SFC) algorithm and principal component analysis (PCA) algorithm. In this method, the data are classified into high-risk data and low-risk data at first, which are detected by high frequency and low frequency, respectively. At the same time, the self-adjustment of the detection frequency is carried out according to the suppressed fuzzy clustering algorithm and the principal component analysis algorithm. Finally, the key factors influencing the algorithm are analyzed deeply by simulation experiment. The results shows that, compared to traditional method, this method has better adaptability.
Abkürzungen
IDS
Intrusion detection system
IoT
Internet of things
PCA
Principal component analysis
RBM
Restricted Boltzmann machine
SFC
Suppressed fuzzy clustering
SVM
Support vector machine
WSN
Wireless sensor networks

1 Introduction

Owing to the rapid development and wide applications of the Internet of Things (IoT) techniques, security of IoT has attracted increasing attentions. IoT is a sensor network consisting of various sensor nodes, which are readily exposed to attacks as they are usually located in sites with no monitoring [1, 2]. To make it worse, attacks on IoT may lead to huge damages in a wide range, compared with computer networks. Hence, security risks in all aspects of IoT and strategies should be analyzed as a whole and the simplification of end security set-up is of IoT great significance [3]. The detection systems should be further optimized based on analysis of risk categories and security structures of IoT [4].
The intrusion detection method judges attacks based on data collected by multiple collection points in a computer network [5, 6]. The intrusion detection is an active protection technique that can intercept and respond to intrusions before they reach the network. However, the huge network data traffic is a huge challenge to intrusion detection systems as it induces high requirements on the detection efficiency so that attacks can be detected in real time. The restricted Boltzmann machine (RBM) network was trained using the greedy algorithm, and low dimension expressions of the RBM network output were classified downwards using the back propagation algorithm [7]. The results indicated that the proposed model shows improved accuracy of intrusion detections, thus suitable for information extractions in high-dimension space. For data compression and low clustering efficiency issues, a modified self-adjustment clustering method is established based on direct correlation to samples close to cluster center [8]. This method effectively reduced clustering sample size and clustering time-space consumption and improves the effectiveness of intrusion detection. Aimed at feature optimization and selection in intrusion detections, a support vector machine (SVM) based two-stage feature selection method was proposed based on feature evaluations of the ratio of detection rate and false alarm rate [9]. In this method, filter noises and irrelevant features were filtered using Fisher classification and information gain in the filtering mode, respectively, to obtain overlapping feature subsets and effectively reduce modeling and detection time. For intrusion detections of internal nodes in wireless sensor networks (WSN), a layer-clustered intrusion detection method for trust value of node a based on the Beta distribution theory and outlier factor was proposed [10]. This method identifies abnormal nodes based on the Mahalanobis distance and exhibits low false alarm rates. Based on classification methods in data mining, optimized solutions were identified by direction calculations of relevant matrices and multi-category network attacks are analyzed by multi-objective mathematical programming model [11]. This method exhibits advantages such as low complexity, effective detections of multi-category attacks, and low false alarm rates. A fuzzy clustering intrusion model based on genetic algorithm and hierarchical algorithm was proposed [12]. Herein, the feature volume was determined by deletion of data set features using the Youden index, the susceptibility to initial cluster centers was relieved, and the local optimization issues in iteration were overcome. Experimental results demonstrated excellent detection performance of the proposed model for network attacks. For Kernel restriction issues in minimum enclosing ball algorithm, an intrusion detection method based on minimum enclosing ball with extensive Kernel was proposed [13]. This method can obtain the minimum enclosing ball of the sample set according to updates of the center and the radius of sphere and categorize network intrusions according to distributions of support vectors. To enhance the accuracy of intrusion detections, an intrusion detection method combining artificial immunity and rough set was proposed for vaccine injections [14]. This method can achieve real time detections of unknown attacks with improved effectiveness and efficiency. Also, a network intrusion detection model was proposed and an alarm system combining multiple proof techniques was established to filter false alarms [15]. An improved multi-objective genetic algorithm-based intrusion detection integrated method has been proposed [16]. This algorithm can effectively solve feature selection issues in intrusion detections, and the method based on this algorithm exhibited excellent detection accuracy and wide applicability to different categories of attacks.
Although intrusion detection technology has been widely used, there are still many problems, such as large number of alerts, high false alarm rate, poor generality, and false report. In this article, an intrusion detection method for IoT was proposed based on suppressed fuzzy clustering (SFC) algorithm [17, 18] and principal component analysis (PCA) algorithm [19, 20]. Simulations demonstrated high detection efficiency and significantly reduced detection time of the proposed method. Section 2 describes the objective prejudgment model of intrusion detections, Section 3 proposes solution of intrusion detections, Section 4 involves simulations, and Section 5 includes a conclusion.

2 Objective prejudgment model

IoT consists of multiple sensor nodes with low communication traffic and short communication range. All nodes are identical and abnormal data packets can be detected by monitoring of wireless ports at all nodes. An intrusion detection system (IDS) for IoT is a solid system consisting of six closely related parts, including data packet monitoring, boundary identification, key management, local detection, voting, and local responses [21].
As the sensor nodes in IoT are readily exposed to attacks, IDS proxy was designed for each node in IoT to realize network monitoring, group decision, and other operations. However, current algorithms are limited by drawbacks such as late alarms, high false alarm rate, and low detection efficiency [22]. This study focuses on optimization of efficiency and effectiveness of intrusion detections. Owing to the rapidly increasing data transmission size in IoT, feature extraction can be extremely time consuming and its efficiency has a severe effect on detections. To guarantee good efficiency and effectiveness of intrusion detections, extractions of feature vectors of the data obtained were achieved by the PCA algorithm. In this way, the efficiency and effectiveness intrusion detection algorithm were significantly improved.
With one sample size, p variables of n groups of data were monitored (e.g., abnormal request data packets, missing data packets). The sample monitoring data matrix X can be described by:
$$ X=\left[\begin{array}{c}{x}_{11}\\ {}{x}_{21}\\ {}\vdots \\ {}{x}_{n1}\end{array}\kern0.5em \begin{array}{c}\kern0.5em {x}_{12}\\ {}{x}_{22}\\ {}\vdots \\ {}{x}_{n2}\end{array}\kern0.5em \begin{array}{c}\cdots \\ {}\cdots \\ {}\vdots \\ {}\cdots \end{array}\kern0.5em \begin{array}{c}{x}_{1p}\\ {}{x}_{2p}\\ {}\vdots \\ {}{x}_{np}\end{array}\right]=\left[\begin{array}{l}{x}_1\\ {}{x}_2\\ {}\vdots \\ {}{x}_p\end{array}\right] $$
(1)
where X is a matrix consisting of p column vectors, n is the size of data to be monitored, and each data is a coordinate in the nth dimension. The monitoring data of original samples were standardized:
$$ {x_{ij}}^{\ast }=\frac{x_{ij}-\overline{x_j}}{\sqrt{V\left({x}_j\right)}},\left(i=1,3,\cdots, n;j=1,2,\cdots, p\right) $$
(2)
$$ \overline{x_j}=\frac{1}{n}\sum \limits_{i=1}^n{x}_{ij} $$
(3)
Then, X was projected to the low dimension space vector (T), as follows:
$$ T={W}^TX $$
(4)
where W refers to the projection matrix, which is an orthogonal matrix consisting of covariance matrices (V(x j )), it can be calculated by:
$$ V\left({x}_j\right)=\frac{1}{n}\sum \limits_{i=1}^n{\left({x}_{ij}-\overline{x_j}\right)}^2,\left(j=1,2,\cdots, p\right) $$
(5)
$$ {\mathrm{VW}}_{\mathrm{i}}={\lambda}_i\overrightarrow{{\mathrm{W}}_{\mathrm{i}}},\left(i=1,2,\cdots, p\right) $$
(6)
where the covariance matrix (W i ) is located in the ith column of W, and \( \overrightarrow{{\mathrm{W}}_{\mathrm{i}}} \) is the feature vector corresponding to one specific feature (λ i ) of V. To achieve rapid detections, features with ambiguous values were eliminated to enhance the detection efficiency. The feature vectors with relatively large values were selected. Herein, an objective prejudgment-based intrusion detection, frequency self-adjustment algorithm for IoT was proposed. In this algorithm, the huge data flow is integrated and analyzed. More specifically, the data is classified using the clustering algorithm: the data sent to potential objectives to be attacked is classified as high-risk data, while other data is classified as low-risk data. The high-risk data and the low-risk data are detected under high frequency and low frequency, respectively.
Define the data set to be clustered as X = {x1, x2, …, x n }, where each sample x k (1, 2, …, n) has several features, including data transmission rate, average length of data packets, and intervals of data emission. xk = (xk1, xk2, …, xkj)T Rj is the corresponding feature vector, which represents a point in the data feature space, and x kj is the feature vector in the jth dimension. In this way, data in X is categorized as high-risk data or low-risk data. The result is denoted as a matrix in order of c*n (U = [uij]c*n), which satisfies
$$ \forall i,j,{u}_{ij}=\left[0,1\right] $$
(7)
$$ \forall j,\sum \limits_{i=1}^c{u}_{ij} $$
(8)
$$ \forall i,0<\sum \limits_{j=1}^n{u}_{ij}<n $$
(9)
The weight distances from samples to the cluster center are defined as objective functions, which can be calculated by
$$ {J}_m\left(U,V\right)=\sum \limits_{j=1}^n\sum \limits_{i=1}^c{\left({u}_{ij}\right)}^m{\left({d}_{ij}\right)}^2 $$
(10)
$$ {d}_{ij}=\sqrt{\sum \limits_{t=1}^s{\left({x}_{jt}-{v}_{it}\right)}^2} $$
(11)
where U = [uij]2*n is fuzzy classification matrix (uij [0, 1]), m is the weighed index, m ∈ [1, ∞], d ij is the Euclidean distance (d ij ) between x j , and the ith cluster center v i (i = 1, 2, …, c). dij can be calculated by Eq. (11).

3 Intrusion detection method

To ensure rapid and effective detections of attacks, an objective prejudgment-based intrusion detection, frequency self-adjustment method for IoT is proposed. With no distortions of original data guaranteed, the PCA algorithm can reduce the number of variables and eliminate features with low discriminations. The dimension reduced data was divided by SFC algorithm as high-risk and low-risk data, which are detected using different frequencies to achieve enhanced detection efficiency and accuracy. The procedures are as follows:
(a)
Data initialization: define fuzzy clustering set as c = 2 and optimized classification threshold as ε = 0.3, initialized detection machine number as n, minimum detection frequency of low-risk data as l min , maximum detection frequency of high-risk data as l max , time intervals as Δt.
 
(b)
Data pre-processing: randomly initialize the affiliation matrix U = [uij]c*n (uij [0,1]) and Eq. (9) was satisfied. The cluster centers v i (i = 1, 2, …, c) were determined and the Euclidean distance (d ij ) between the jth sample data and the ith cluster center. d ij can be calculated by
 
$$ {v}_i=\frac{\sum \limits_{j=1}^n{\left({u}_{ij}\right)}^m{x}_j}{\sum \limits_{j=1}^n{\left({u}_{ij}\right)}^m},\left(i=1,2,\cdots, c\right) $$
(12)
$$ {d}_{ij}=\sqrt{\sum \limits_{t=1}^s{\left({x}_{jt}-{v}_{it}\right)}^2} $$
(13)
The objective function was calculated using Eq. (10). If the value of objective function was no lower than the given optimized classification threshold, the process was repeated; if the value of objective function was lower than the given optimized classification threshold and no changes of any cluster was observed, the process ends.
Due to the slow converging rates of conventional fuzzy clustering algorithms, a suppressor λ ij (0 < λij < 1) was introduced to d ij for the purpose of correction. Define the corrected distance as \( {d}_{ij}^{\hbox{'}} \)
$$ {d}_{ij}^{\hbox{'}}=1-{\lambda}_{ij}\sum \limits_{i\ne j}{d}_{ij} $$
(14)
It satisfies
$$ \left|{d}_{ij}-\frac{1}{n}\sum \limits_{j=1}^n{d}_{ij}\right|>{\lambda}_{ij} $$
(15)
(c)
First, classified data was analyzed using the PCA algorithm and features with low discriminations were eliminated to accelerate the detection process.
 
(d)
Then, data was detected with self-adjustment of detection frequency according to the detection results. Assume that the quantity of objective machines that can be effectively detected by objective prejudgment based methods is
 
$$ n={n}^{\prime }+\Delta n $$
(16)
where n is the quantity of monitored objective machines, n′ is the quantity of monitored objective machines before application of objective prejudgment, and Δn is the quantity of monitored objective machines after application of objective prejudgment.
The total number (N) of data packets that can be detected per second can be obtained by:
$$ N=n\cdot {l}_{\mathrm{min}}+\left(\frac{l_{\mathrm{max}}-{l}_{\mathrm{min}}}{l_{\mathrm{min}}}\right)\cdot t-{n}^{\prime } $$
(17)
where lmin refers to the minimum detection frequency of low-risk data, lmax refers to the maximum detection frequency of high-risk data, and t (0 ≤ t ≤ n) refers to the total number of objective data under attack. In cases of no attacks to the IoT system, the detection frequency of low-risk data (P′) to each objective with detection effectiveness guaranteed is defined as
$$ {P}^{\prime }=\frac{N}{n} $$
(18)
The detection frequency can be neither over-adjusted (high-risk data is identified as low-risk data) nor under-adjusted (high-risk data cannot be detected) and an appropriate frequency difference is of great significance. With detection effectiveness and accuracy guaranteed, the adjustable data detection frequency difference is defined as
$$ \Delta f=\sum \limits_{i=1}^{n-k}{P}^{\prime }-{l}_{\mathrm{min}} $$
(19)
In this way, detection frequencies of high-risk data (P i max) and low-risk data (P i low) of the ith objective machine by the NIDS system can be obtained
$$ {P^i}_{\mathrm{max}}={P}^{\prime }+\frac{\eta_{\mathrm{i}}\cdot \Delta f}{\mathrm{k}} $$
(20)
$$ {P^i}_{low}=\frac{1}{n-k}\left(N-\sum \limits_{i=1}^n{P}_{\mathrm{max}}\right) $$
(21)
$$ {\eta}_i=\frac{A_i}{C_i} $$
(22)
where η i is the ratio of abnormal data sent to the ith objective machine in Δt, A i refers to the detected abnormal data sent to ith potential target in Δt, and C i refers to all detected abnormal data sent to ith potential target in Δt. In detections, the detection frequency of the objective was adjusted in real time according to η i to optimize the detection accuracy.

4 Simulations

In this study, the objective prejudgment-based intrusion detection system for IoT was employed. The data was pre-processed using SFC algorithm and PCA algorithm and then detected by frequency self-adjustment. The results indicated that the proposed algorithm can not only enhance the detection efficiency but also reduce the false alarm rate. The accuracy index is the most important performance index of the intrusion detection system, and its value depends on the sample set and the test environment used in the test. The three parameters of detection duration, accuracy rate, and false alarm rate are usually used as evaluation indexes. Therefore, in this study, detection duration (T), accuracy (P), and false alarm rate (F) were employed as evaluation parameters:
$$ P=\frac{N_t}{N^{\prime }}\times 100\% $$
(23)
$$ F=\frac{N_f}{N}\times 100\% $$
(24)
where N t is the size of attack samples that are accurately detected, N f is the size of false alarms, and N′ is the size of overall attacks identified by the system, and N is the size of overall real attacks.
Table 1 summarizes detection results of the proposed algorithm, the neural network algorithm, and the Bayesian algorithm. As observed, the accuracy of the proposed algorithm is higher than those of the other two algorithms. This can be attributed to data dimension reduction by PCA algorithm, which eliminates interferences by irrelevant factors. Additionally, the false alarm rate of the proposed algorithm is lower than those of the other two algorithms. Hence, it can be concluded that the proposed algorithm is viable.
Table 1
Properties of raw materials
Algorithm
Accuracy (%)
False alarm rate (%)
The proposed algorithm
97.1
1.5
Neural network algorithm
93.4
4.5
Bayesian algorithm
95.2
3.2
Figure 1 summarizes the effects of the overall data size on the detection efficiency using different algorithms. As observed, detection efficiencies of the three algorithms decreased as the data size increased, while the detection efficiency of the proposed algorithm is lower than those of the other two algorithms. The detection efficiency of the proposed algorithm is higher than those of the other two algorithms, regardless of the overall data size. Therefore, it can be concluded that the proposed algorithm can enhance detection efficiency.
Table 2 summarizes detection results of the proposed algorithm. As observed, the detection rate of abnormal data increased as the time increased. This can be attributed to the continuous self-adjustment of detection frequency according to the responses received.
Table 2
Detection results of the proposed algorithm
Time (s)
Actual abnormal data packet
Detected abnormal data packet
Detection rate (%)
0–10
3290
3175
96.5
10–20
4367
4227
96.8
20–30
3632
3534
97.3
30–40
3487
3396
97.4
The accuracy is a key indicator for intrusion detections. The effects of overall data size on the detection accuracy were investigated using different algorithm models, and the results are shown in Fig. 2. As observed, the detection accuracy degraded as the data size increased in all three cases, as the increasing data size leads to decreasing detection efficiency. However, the decreasing rate of the proposed algorithm model was lower than those of the other two algorithms and the accuracy of the proposed algorithm model was higher than those of the other two algorithms in all cases. Therefore, the proposed algorithm model is viable.

5 Results

With the rapid development of the IoT technology, the security problem is becoming more and more serious. All sensor nodes in IoT are vulnerable to external attacks. The huge network data traffic is a huge challenge to intrusion detection systems as it induces high requirements on the detection efficiency so that attacks can be detected in real time. However, current algorithms are limited by drawbacks such as late alarms, high false alarm rate, and low detection efficiency. Aimed at low effectiveness of intrusion detections for IoT, an intrusion detection method for IoT based on SFC algorithm and PCA algorithm is proposed. In this method, the data obtained are classified by objective prejudgment into high-risk data and low-risk data, which are detected at high frequency and low frequency, respectively. Meanwhile, the self-adjustment of detection frequency is achieved by employing the SFC algorithm and the PCA algorithm. Experimental results revealed improved applicability of the proposed method, compared with conventional methods (e.g., neural network algorithm, Bayesian algorithm). The innovation of this paper is to propose an objective prejudgment-based intrusion detection, frequency self-adjustment method for IoT. With no distortions of original data guaranteed, the PCA algorithm can reduce the number of variables and eliminate features with low discriminations. The dimension reduced data was divided as high-risk and low-risk data, and then tested at different frequencies, which are detected using different frequencies to achieve enhanced detection efficiency and accuracy. This method can quickly improve the effectiveness and accuracy of intrusion detection.

6 Discussion

In this study, the number of samples and the detection time are several important factors that affect the efficiency of the algorithm. The key factors affecting this algorithm are analyzed by simulations. Experimental results show that with the increase of data volume, the efficiency and accuracy of intrusion detection algorithm will gradually decrease. Compared with Bayesian algorithm and neural network algorithm, the new algorithm in this paper still has better detection efficiency.
With the continuous development of related research, new intrusion detection models of IOT will be more and more, and the evaluation index will also continue to expand. In subsequent research, we can consider the combination of other indicators and new features of IOT to improve the intrusion detection model.

Acknowledgements

The research presented in this paper was supported by the Funds of Science & Technology Research of Guangdong Province and the Natural Science Foundation of Guangdong Province, China.

Funding

The authors acknowledge the Funds of Science & Technology Research of Guangdong Province, China (Grants: 2015B010128015 and 2017A040403070) and the Natural Science Foundation of Guangdong Province (Grant: 2017A030307027),China.

Competing interests

The authors declare that they have no competing interests.

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Open AccessThis article is distributed under the terms of the Creative Commons Attribution 4.0 International License (http://​creativecommons.​org/​licenses/​by/​4.​0/​), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.
Literatur
1.
Zurück zum Zitat XD Hu, ZM Jia, A method of lightweight intrusion detection for the Internet of things. J. Chongqing Univ. Posts Telecommun. 2(27), 255–259 (2015) XD Hu, ZM Jia, A method of lightweight intrusion detection for the Internet of things. J. Chongqing Univ. Posts Telecommun. 2(27), 255–259 (2015)
2.
Zurück zum Zitat GY Tang, Network intrusion detection method based on constraint fuzzy clustering thought. Natl. Sci. J. Xiangtan Univ. 3(39), 61–64 (2017) GY Tang, Network intrusion detection method based on constraint fuzzy clustering thought. Natl. Sci. J. Xiangtan Univ. 3(39), 61–64 (2017)
3.
Zurück zum Zitat F Jia, LZ Kong, Intrusion detection algorithm based on convolutional neural network. Trans. Beijing Inst. Technol. 12(37), 1271–1275 (2017) F Jia, LZ Kong, Intrusion detection algorithm based on convolutional neural network. Trans. Beijing Inst. Technol. 12(37), 1271–1275 (2017)
4.
Zurück zum Zitat XC Liu, SF Lu, W Zhao, et al., A cloud computing intrusion detection with objective function optimization based on fuzzy C-means clustering algorithm. J. Cent. South Univ. 7(47), 2320–2325 (2016) XC Liu, SF Lu, W Zhao, et al., A cloud computing intrusion detection with objective function optimization based on fuzzy C-means clustering algorithm. J. Cent. South Univ. 7(47), 2320–2325 (2016)
5.
Zurück zum Zitat GD Li, JP Hu, KW Xia, Intrusion detection using relevance vector machine based on cloud particle swarm optimization. Control Decision. 30(4), 698–702 (2015) GD Li, JP Hu, KW Xia, Intrusion detection using relevance vector machine based on cloud particle swarm optimization. Control Decision. 30(4), 698–702 (2015)
6.
Zurück zum Zitat YH Yang, HZ Huang, QN Shen, et al., Research on intrusion detection based on incremental GHSOM. Chin. J. Comput.. 37(5), 1216–1224 (2014) YH Yang, HZ Huang, QN Shen, et al., Research on intrusion detection based on incremental GHSOM. Chin. J. Comput.. 37(5), 1216–1224 (2014)
7.
Zurück zum Zitat N Gao, L Gao, YY He, Deep belief nets model oriented to intrusion detection system. Syst. Eng. Electron. 38(9), 2201–2207 (2016) N Gao, L Gao, YY He, Deep belief nets model oriented to intrusion detection system. Syst. Eng. Electron. 38(9), 2201–2207 (2016)
8.
Zurück zum Zitat J Jiang, ZF Wang, TM Chen, et al., Adaptive AP clustering algorithm and its application on intrusion detection. J. Commun. 36(11), 118–126 (2015) J Jiang, ZF Wang, TM Chen, et al., Adaptive AP clustering algorithm and its application on intrusion detection. J. Commun. 36(11), 118–126 (2015)
9.
Zurück zum Zitat XN Wu, XJ Peng, YY Yang, et al., Two-level feature selection method based on SVM for intrusion detection. J. Commun. 36(4), 2015127-1–2015127-8 (2015) XN Wu, XJ Peng, YY Yang, et al., Two-level feature selection method based on SVM for intrusion detection. J. Commun. 36(4), 2015127-1–2015127-8 (2015)
10.
Zurück zum Zitat WM Tong, JQ Liang, L Lu, et al., Intrusion detection scheme based node trust value in WSNs. Syst. Eng. Electron 37(7), 1644–1649 (2015) WM Tong, JQ Liang, L Lu, et al., Intrusion detection scheme based node trust value in WSNs. Syst. Eng. Electron 37(7), 1644–1649 (2015)
11.
Zurück zum Zitat B Wang, XW Nie, Multi-criteria mathematical programming based method on network intrusion detection. J. Comput. Res. Dev. 52(10), 2239–2246 (2015) B Wang, XW Nie, Multi-criteria mathematical programming based method on network intrusion detection. J. Comput. Res. Dev. 52(10), 2239–2246 (2015)
12.
Zurück zum Zitat CH Tang, PC Liu, SS Tang, et al., Anomaly intrusion behavior detection based on fuzzy clustering and features selection. J. Comput. Res. Dev. 52(3), 718–728 (2015) CH Tang, PC Liu, SS Tang, et al., Anomaly intrusion behavior detection based on fuzzy clustering and features selection. J. Comput. Res. Dev. 52(3), 718–728 (2015)
13.
Zurück zum Zitat QA Wang, B Chen, Intrusion detection system using CVM algorithm with extensive kernel methods. J. Comput. Res. Dev. 49(5), 974–982 (2012) QA Wang, B Chen, Intrusion detection system using CVM algorithm with extensive kernel methods. J. Comput. Res. Dev. 49(5), 974–982 (2012)
14.
Zurück zum Zitat L Zhang, ZY Bai, SS Luo, et al., Integrated intrusion detection model based on rough set and artificial immune. J. Commun. 34(9), 166–176 (2013) L Zhang, ZY Bai, SS Luo, et al., Integrated intrusion detection model based on rough set and artificial immune. J. Commun. 34(9), 166–176 (2013)
15.
Zurück zum Zitat ZH Tian, BL Wang, WZ Zhang, et al., Network intrusion detection model based on context verification. J. Comput. Res. Dev. 50(3), 498–508 (2013) ZH Tian, BL Wang, WZ Zhang, et al., Network intrusion detection model based on context verification. J. Comput. Res. Dev. 50(3), 498–508 (2013)
16.
Zurück zum Zitat Y Yu, H Huang, An ensemble approach to intrusion detection based on improved multi-objective genetic algorithm. J. Softw. 18(6), 1369–1378 (2007)CrossRef Y Yu, H Huang, An ensemble approach to intrusion detection based on improved multi-objective genetic algorithm. J. Softw. 18(6), 1369–1378 (2007)CrossRef
17.
Zurück zum Zitat B Liu, SX Xia, Y Zhou, et al., A sample-weighted possibilistic fuzzy clustering algorithm. Acta Electron. Sin. 40(2), 371–375 (2012) B Liu, SX Xia, Y Zhou, et al., A sample-weighted possibilistic fuzzy clustering algorithm. Acta Electron. Sin. 40(2), 371–375 (2012)
18.
Zurück zum Zitat AG Chen, ST Wang, Fuzzy clustering algorithm based on multiple medoids for large-scale data. Control Decision. 31(12), 2122–2130 (2016)MATH AG Chen, ST Wang, Fuzzy clustering algorithm based on multiple medoids for large-scale data. Control Decision. 31(12), 2122–2130 (2016)MATH
19.
Zurück zum Zitat ZZ Liang, Y Li, SX Xia, et al., Principal component analysis based on L1-norm maximization with Lp-norm constraints. PR AI 26(2), 211–217 (2013) ZZ Liang, Y Li, SX Xia, et al., Principal component analysis based on L1-norm maximization with Lp-norm constraints. PR AI 26(2), 211–217 (2013)
20.
Zurück zum Zitat Y Ruan, HW Chen, ZH Liu, et al., Quantum principal component analysis algorithm. Chin. J. Comput 37(3), 666–676 (2014) Y Ruan, HW Chen, ZH Liu, et al., Quantum principal component analysis algorithm. Chin. J. Comput 37(3), 666–676 (2014)
21.
Zurück zum Zitat M Ahmed, AN Mahmood, J Hu, A survey of network anomaly detection techniques. J. Netw. Comput. Appl. 60, 19–31 (2016)CrossRef M Ahmed, AN Mahmood, J Hu, A survey of network anomaly detection techniques. J. Netw. Comput. Appl. 60, 19–31 (2016)CrossRef
22.
Zurück zum Zitat Y Chen, An efficient feature selection algorithm toward building lightweight intrusion detection system. Chin. J. Comput. 30(8), 1398–1408 (2015) Y Chen, An efficient feature selection algorithm toward building lightweight intrusion detection system. Chin. J. Comput. 30(8), 1398–1408 (2015)
Metadaten
Titel
An intrusion detection method for internet of things based on suppressed fuzzy clustering
verfasst von
Liqun Liu
Bing Xu
Xiaoping Zhang
Xianjun Wu
Publikationsdatum
01.12.2018
Verlag
Springer International Publishing
DOI
https://doi.org/10.1186/s13638-018-1128-z

Weitere Artikel der Ausgabe 1/2018

EURASIP Journal on Wireless Communications and Networking 1/2018 Zur Ausgabe