Security detection of network intrusion: application of cluster analysis method

被引:0
|
作者
Yang, W. H. [1 ]
机构
[1] Shandong Polytech, Railway Signal & Informat Engn Dept, Jinan 250104, Shandong, Peoples R China
关键词
clustering analysis; K-means; cross entropy; network intrusion;
D O I
10.18287/412-6179-CO-657
中图分类号
O43 [光学];
学科分类号
070207 ; 0803 ;
摘要
In order to resist network malicious attacks, this paper briefly introduced the network intrusion detection model and K-means clustering analysis algorithm, improved them, and made a simulation analysis on two clustering analysis algorithms on MATLAB software. The results showed that the improved K-means algorithm could achieve central convergence faster in training, and the mean square deviation of clustering center was smaller than the traditional one in convergence. In the detection of normal and abnormal data, the improved K-means algorithm had higher accuracy and lower false alarm rate and missing report rate. In summary, the improved K-means algorithm can be applied to network intrusion detection.
引用
收藏
页码:660 / 664
页数:5
相关论文
共 50 条
  • [41] MU-IoT: A New IoT Intrusion Dataset for Network and Application Layer Attacks Analysis
    Clinton, Urikhimbam Boby
    Hoque, Nazrul
    IEEE ACCESS, 2024, 12 : 166068 - 166092
  • [42] Quantum-inspired ant lion optimized hybrid k-means for cluster analysis and intrusion detection
    Chen, Junwen
    Qi, Xuemei
    Chen, Linfeng
    Chen, Fulong
    Cheng, Guihua
    KNOWLEDGE-BASED SYSTEMS, 2020, 203
  • [43] Improving the Particle Swarm Algorithm and Optimizing the Network Intrusion Detection of Neural Network
    Yang, Xu
    Hui, Zhao
    PROCEEDINGS 2015 SIXTH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS DESIGN AND ENGINEERING APPLICATIONS ISDEA 2015, 2015, : 452 - 455
  • [44] Y-means: A clustering method for intrusion detection
    Guan, Y
    Ghorbani, AA
    Belacel, N
    CCECE 2003: CANADIAN CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING, VOLS 1-3, PROCEEDINGS: TOWARD A CARING AND HUMANE TECHNOLOGY, 2003, : 1083 - 1086
  • [45] Network Intrusion Detection Based on Dynamic Intuitionistic Fuzzy Sets
    Xie, Jialiang
    Wang, Honghui
    Garibaldi, Jonathan M.
    Wu, Dongrui
    IEEE TRANSACTIONS ON FUZZY SYSTEMS, 2022, 30 (09) : 3460 - 3472
  • [46] Network Intrusion Detection System Model Based On Artificial Immune
    Zhang Yanbin
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (09): : 359 - 369
  • [47] Data preprocessing for anomaly based network intrusion detection: A review
    Davis, Jonathan J.
    Clark, Andrew J.
    COMPUTERS & SECURITY, 2011, 30 (6-7) : 353 - 375
  • [48] Using OpenCL to Improve String Matching for Network Intrusion Detection
    Velea, Radu
    Patriciu, Victor-Valeriu
    Gurzau, Florina
    2015 20TH INTERNATIONAL CONFERENCE ON CONTROL SYSTEMS AND COMPUTER SCIENCE, 2015, : 447 - 452
  • [49] Research On SVM Detection Of Network Intrusion Based On Vulnerability Scanning
    Yang, Jie
    SEVENTH WUHAN INTERNATIONAL CONFERENCE ON E-BUSINESS, VOLS I-III, 2008, : 1286 - 1291
  • [50] Research on Network Intrusion Detection Technology Based on Machine Learning
    Fei Wu
    Ting Li
    Zhen Wu
    ShuLin Wu
    ChuanQi Xiao
    International Journal of Wireless Information Networks, 2021, 28 : 262 - 275