TY - JOUR
T1 - A granular classifier by means of context-based similarity clustering
AU - Huang, Wei
AU - Wang, Jinsong
AU - Liao, Jiping
N1 - Publisher Copyright:
© The Korean Institute of Electrical Engineers.
PY - 2016/7
Y1 - 2016/7
N2 - In this study, we propose a granular classifier (GC) with the aid of a context-based similarity clustering (CSC) method and applied it for network intrusion detection. The proposed CSC supporting the design of information granules is exploited here to determine the so-called contexts. Unlike the conventional similar clustering method, here the CSC built clusters by taking into consideration of both input data and output data. The design of granular classifier is realized based on the if-then rules, which consists two parts: namely premise part and conclusion part. The premise part is developed by using the CSC, while the conclusion part is realized with the aid of supported vector machines. In contrast to typical rule-based classifier, the underlying principle exploited here is to consider a robust classification with the adequate use of output data. In particular, rule-based classifiers or supported vector machines can be regarded as a special case of the proposed granular classifier. Numeric studies show the superiority of the proposed approach.
AB - In this study, we propose a granular classifier (GC) with the aid of a context-based similarity clustering (CSC) method and applied it for network intrusion detection. The proposed CSC supporting the design of information granules is exploited here to determine the so-called contexts. Unlike the conventional similar clustering method, here the CSC built clusters by taking into consideration of both input data and output data. The design of granular classifier is realized based on the if-then rules, which consists two parts: namely premise part and conclusion part. The premise part is developed by using the CSC, while the conclusion part is realized with the aid of supported vector machines. In contrast to typical rule-based classifier, the underlying principle exploited here is to consider a robust classification with the adequate use of output data. In particular, rule-based classifiers or supported vector machines can be regarded as a special case of the proposed granular classifier. Numeric studies show the superiority of the proposed approach.
KW - Context-based similarity clustering (CSC)
KW - Granular classifier
KW - Network intrusion detection
UR - http://www.scopus.com/inward/record.url?scp=84974794761&partnerID=8YFLogxK
U2 - 10.5370/JEET.2016.11.4.993
DO - 10.5370/JEET.2016.11.4.993
M3 - Article
AN - SCOPUS:84974794761
SN - 1975-0102
VL - 11
SP - 993
EP - 1004
JO - Journal of Electrical Engineering and Technology
JF - Journal of Electrical Engineering and Technology
IS - 4
ER -