9 CONCLUSIONS
In our work we proposed a new algorithm based on
the merge of two algorithms: K-Hamornic means
(KHM) and Firefly Algorithm (FA), named Firefly
Harmonic Clustering Algorithm (FHCA). The FHCA
utilizes the strength of KHM giving weight to mem-
bers in calculating the centroids, circumventing the
initialization problem present in center based cluster-
ing algorithm and exploits the search capability of FA
in escaping local optima.
Applying the FHCA to detect abnormalities in
volume, the results achieve by the algorithm are
satisfactory presenting high true-positive rates and
medium false-positive rates. The results present a
true-positive rate above 90% and false-positive rates
of nearly 30%. For anomaly techniques applied
in real time the algorithm present a complexity of
O(N*K*D), where N = data points, K = number of
centers and D = dimension.
The next step is to combine the power of FHCA
with another technique, i.e., Principal Component
Analysis (PCA) or Support Vector Machine (SVM)
to use other objects collected from the same segment
network to group the results adding more complex-
ity to increase the precision and decrease the false-
positive rate.
ACKNOWLEDGEMENTS
This work was supported by Coordenac¸˜ao de
Aperfeic¸oamento de Pessoal de N´ıvel Superior
(CAPES) through a post-graduate master’s degree
level and Fundac¸˜ao Arauc´aria by the financial support
for the Riguel Project.
REFERENCES
Chandola, V., Banerjee, A., and Kumar, V. (2009).
Anomaly detection: A survey. ACM Computing Sur-
veys., 41(3).
Fawcett, T. (2005). An introduction to ROC analysis. Pat-
tern Recognition Letters, 27:861–874.
G¨ung¨or, Z. and
¨
Unler, A. (2007). K-harmonic means data
clustering with simulated annealing heuristic. Applied
Mathematics and Computation, 184(2):199–209.
Jain, A., Murty, M., and Flynn, P. (1999). Data clustering:
A review. ACM Computing Survey, 31(3):264–323.
Lima, M., Zarpel˜ao, B., Sampaio, L., Rodrigues, J., Abr˜ao,
T., and Proenc¸a Jr., M. (2010). Anomaly detection
using baseline and k-means clustering. In Software,
Telecommunications and Computer Networks (Soft-
COM), 2010 International Conference on, pages 305
–309.
MacQueen, J. B. (1967). Some methods for classification
and analysis of multivariate observations. In Pro-
ceedings of 5th Berkeley Symposium on Mathematical
Statistics and Probability, pages 281–297.
Patcha, A. and Park, J.-M. (2007). An overview of anomaly
detection techniques: Existing solutions and latest
technological trends. Computer Networks: The In-
ternational Journal of Computer and Telecommunica-
tions Networking, 51:3448–3470.
Pham, D. T., Otri, S., Afify, A. A., Mahmuddin, M., and
Al-Jabbouli, H. (2007). Data clustering using the bees
algorithm. In Proc 40th CIRP Int. Manufacturing Sys-
tems Seminar, Liverpool.
Proenc¸a, M. L., Coppelmans, C., Botolli, M., and
de Souza Mendes, L. (2006). Security and reliability
in information systems and networks: Baseline to help
with network management., pages 149–157. Springer.
Selim, S. Z. and Ismail, M. A. (1984). K–means type algo-
rithms: A generalized convergence theorem and char-
acterization of local optimality. IEEE Transactions on
Pattern Analysis and Machine Intelligence, 6:81–86.
Sequeira, K. and Zaki, M. (2002). Admit: anomaly-
based data mining for intrusions. In Proceedings
of the eighth ACM SIGKDD international conference
on Knowledge discovery and data mining, KDD ’02,
pages 386–395, New York, NY, USA. ACM.
Yang, F., Sun, T., and Zhang, C. (2009). An efficient hybrid
data clustering method based on k-harmonic means
and particle swarm optimization. Expert Syst. Appl.,
36(6):9847–9852.
Yang, X.-S. (2008). Nature-Inspired Metaheuristic Algo-
rithms. Luniver Press.
Yang, X.-S. (2009). Firefly algorithms for multimodal opti-
mization. In Stochastic Algorithms: Foundations and
Applications, SAGA 2009, Lecture Notes in Computer
Sciences, volume 5792, pages 169–178.
Zarpel˜ao, B. B., de Souza Mendes, L., Jr., M. L. P., and
Rodrigues, J. J. P. C. (2009). Parameterized anomaly
detection system with automatic configuration. In
GLOBECOM, pages 1–6. IEEE.
Zhang, B., Hsu, M., and Dayal, U. (1999). K-harmonic
means - a data clustering algorithm. Technical Report
HPL-1999-124, Hewlett-Packard Laboratories.
Zhang, W., Yang, Q., and Geng, Y. (2009). A survey of
anomaly detection methods in networks. In Computer
Network and Multimedia Technology, 2009. CNMT
2009. International Symposium on, pages 1 –3.
DCNET 2011 - International Conference on Data Communication Networking
68