Security detection of network intrusion: application of cluster analysis method

被引:0
|
作者
Yang, W. H. [1 ]
机构
[1] Shandong Polytech, Railway Signal & Informat Engn Dept, Jinan 250104, Shandong, Peoples R China
关键词
clustering analysis; K-means; cross entropy; network intrusion;
D O I
10.18287/412-6179-CO-657
中图分类号
O43 [光学];
学科分类号
070207 ; 0803 ;
摘要
In order to resist network malicious attacks, this paper briefly introduced the network intrusion detection model and K-means clustering analysis algorithm, improved them, and made a simulation analysis on two clustering analysis algorithms on MATLAB software. The results showed that the improved K-means algorithm could achieve central convergence faster in training, and the mean square deviation of clustering center was smaller than the traditional one in convergence. In the detection of normal and abnormal data, the improved K-means algorithm had higher accuracy and lower false alarm rate and missing report rate. In summary, the improved K-means algorithm can be applied to network intrusion detection.
引用
收藏
页码:660 / 664
页数:5
相关论文
共 50 条
  • [31] A Cluster Analysis of Lotte Young Plaza Using Semantic Network Analysis Method
    Che, ShaoPeng
    Nan, Dongyan
    Kamphuis, Pim
    Jin, Xinyu
    Kim, Jang Hyun
    PROCEEDINGS OF THE 2021 15TH INTERNATIONAL CONFERENCE ON UBIQUITOUS INFORMATION MANAGEMENT AND COMMUNICATION (IMCOM 2021), 2021,
  • [32] Network Intrusion Detection Method for Smart Grid Based on PCA-ISBO-GRU-AM
    Wang, Zhiying
    Zhang, Feifei
    Wang, Hao
    Zhang, Xiangcong
    Lu, Weizhi
    Zhang, Chan
    Wang, Lei
    Wang, Bingjie
    2024 7TH INTERNATIONAL CONFERENCE ON RENEWABLE ENERGY AND POWER ENGINEERING, REPE 2024, 2024, : 97 - 101
  • [33] An Efficient Hyperparameter Control Method for a Network Intrusion Detection System Based on Proximal Policy Optimization
    Han, Hyojoon
    Kim, Hyukho
    Kim, Yangwoo
    SYMMETRY-BASEL, 2022, 14 (01):
  • [34] Intrusion Detection Method Based on LEGClust Algorithm
    Zhao, Yilin
    Zhou, Qinglei
    INFORMATION TECHNOLOGY APPLICATIONS IN INDUSTRY, PTS 1-4, 2013, 263-266 : 3025 - 3033
  • [35] Network Intrusion Detection Using Machine Learning Anomaly Detection Algorithms
    Hanifi, Khadija
    Bank, Hasan
    Karsligil, M. Elif
    Yavuz, A. Gokhan
    Guvensan, M. Amac
    2017 25TH SIGNAL PROCESSING AND COMMUNICATIONS APPLICATIONS CONFERENCE (SIU), 2017,
  • [36] Network Intrusion Detection, Prevention and Sustainable Mechanisms: A Survey
    Kannari, Phanindra Reddy
    Shariff, Noorullah C.
    Biradar, Raj Kumar L.
    INTERNATIONAL JOURNAL OF EARLY CHILDHOOD SPECIAL EDUCATION, 2022, 14 (03) : 4712 - 4724
  • [37] Simulation on the Effective Detection Model for Network Differentiation Intrusion
    Chun, Liu
    PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON AUTOMATION, MECHANICAL CONTROL AND COMPUTATIONAL ENGINEERING, 2015, 124 : 1035 - 1039
  • [38] Correlation between Deep Neural Network Hidden Layer and Intrusion Detection Performance in IoT Intrusion Detection System
    Han, Hyojoon
    Kim, Hyukho
    Kim, Yangwoo
    SYMMETRY-BASEL, 2022, 14 (10):
  • [39] A lightweight intelligent network intrusion detection system using OCSVM and Pigeon inspired optimizer
    Alazzam, Hadeel
    Sharieh, Ahmad
    Sabri, Khair Eddin
    APPLIED INTELLIGENCE, 2022, 52 (04) : 3527 - 3544
  • [40] APPLICATION OF FUZZY CLUSTERING ALGORITHM IN INTRUSION DETECTION SYSTEM
    Li Yun
    Wu Jie-fang
    Liu Xue-cheng
    3RD INTERNATIONAL SYMPOSIUM ON INFORMATION ENGINEERING AND ELECTRONIC COMMERCE (IEEC 2011), PROCEEDINGS, 2011, : 297 - 300