TY - JOUR
T1 - A granular classifier by means of context-based similarity clustering
AU - Huang, Wei
AU - Wang, Jinsong
AU - Liao, Jiping
N1 - Publisher Copyright:
© The Korean Institute of Electrical Engineers.
PY - 2016/9
Y1 - 2016/9
N2 - In this study, we propose a granular classifier (GC) with the aid of a context-based similarity clustering (CSC) method and applied it for network intrusion detection. The proposed CSC supporting the design of information granules is exploited here to determine the so-called contexts. Unlike the conventional similar clustering method, here the CSC built clusters by taking into consideration of both input data and output data. The design of granular classifier is realized based on the if-then rules, which consists two parts: namely premise part and conclusion part. The premise part is developed by using the CSC, while the conclusion part is realized with the aid of supported vector machines. In contrast to typical rule-based classifier, the underlying principle exploited here is to consider a robust classification with the adequate use of output data. In particular, rule-based classifiers or supported vector machines can be regarded as a special case of the proposed granular classifier. Numeric studies show the superiority of the proposed approach.
AB - In this study, we propose a granular classifier (GC) with the aid of a context-based similarity clustering (CSC) method and applied it for network intrusion detection. The proposed CSC supporting the design of information granules is exploited here to determine the so-called contexts. Unlike the conventional similar clustering method, here the CSC built clusters by taking into consideration of both input data and output data. The design of granular classifier is realized based on the if-then rules, which consists two parts: namely premise part and conclusion part. The premise part is developed by using the CSC, while the conclusion part is realized with the aid of supported vector machines. In contrast to typical rule-based classifier, the underlying principle exploited here is to consider a robust classification with the adequate use of output data. In particular, rule-based classifiers or supported vector machines can be regarded as a special case of the proposed granular classifier. Numeric studies show the superiority of the proposed approach.
KW - Context-based similarity clustering (CSC)
KW - Granular classifier
KW - Network intrusion detection
UR - http://www.scopus.com/inward/record.url?scp=84983239101&partnerID=8YFLogxK
U2 - 10.5370/JEET.2016.11.5.1383
DO - 10.5370/JEET.2016.11.5.1383
M3 - Article
AN - SCOPUS:84983239101
SN - 1975-0102
VL - 11
SP - 1383
EP - 1394
JO - Journal of Electrical Engineering and Technology
JF - Journal of Electrical Engineering and Technology
IS - 5
ER -