CONSTRUCTION METHOD OF INFORMATION SECURITY DETECTION BASED ON CLUSTERING ALGORITHM

被引:0
|
作者
Chen, Shaobo [1 ]
机构
[1] Shaanxi Univ Technol, Sch Math & Comp Sci, Hanzhong 723000, Peoples R China
来源
SCALABLE COMPUTING-PRACTICE AND EXPERIENCE | 2024年 / 25卷 / 06期
关键词
Clustering; Information security; Safety evaluation; PSO algorithm; K; -prototypes; NETWORK; TIME;
D O I
10.12694/scpe.v25i6.3247
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
A method for K-prototype clustering, which can process mixed data types, is proposed first. An algorithm for information security evaluation of hybrid clusters based on K-prototypes was constructed. This method makes full use of the excellent global optimization performance of PSO and effectively solves the defect that the K-protection function quickly falls into local optimization. Simulation results show that the proposed method can effectively prevent local extreme values and improve overall performance.
引用
收藏
页码:5295 / 5301
页数:7
相关论文
共 50 条
  • [1] A new algorithm for clustering analysis and boundary detection in hospital information security
    Zhang, Yifan
    Li, Xingshan
    Shao, Xiangyang
    3RD INTERNATIONAL CONFERENCE ON INTELLIGENT ENERGY AND POWER SYSTEMS (IEPS 2017), 2017, : 155 - 159
  • [2] Vanishing Point Detection Algorithm based on clustering method
    Wan, Fang
    Yang, R.
    ADVANCES IN MECHATRONICS, AUTOMATION AND APPLIED INFORMATION TECHNOLOGIES, PTS 1 AND 2, 2014, 846-847 : 1157 - 1161
  • [3] A Heuristic Clustering Algorithm forIntrusion Detection Based on Information Entropy
    XIONG Jiajun~ 1
    2. College of Computer Science
    Wuhan University Journal of Natural Sciences, 2006, (02) : 355 - 359
  • [4] Advanced Clustering Based Intrusion Detection (ACID) Algorithm
    Borah, Samarjeet
    Chakravorty, Debaditya
    Chawhan, Chandan
    Saha, Aritra
    ADVANCES IN COMPUTING AND COMMUNICATIONS, PT III, 2011, 192 : 35 - 43
  • [5] A Semantic Knowledge Base Construction Method for Information Security
    Yao, Yuangang
    Ma, Xiaoyu
    Liu, Hui
    Yi, Jin
    Zhao, Xianghui
    Liu, Lin
    2014 IEEE 13TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM), 2014, : 803 - 808
  • [6] Ontology based Clustering Algorithm for Information Retrieval
    Ravishankar, Nadana T.
    Shriram, R.
    2013 FOURTH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATIONS AND NETWORKING TECHNOLOGIES (ICCCNT), 2013,
  • [7] Study on mutual information based clustering algorithm
    Hongfang, Zhou
    Boqin, Feng
    Lintao, Lv
    Hui, Yue
    Information Technology Journal, 2007, 6 (02) : 251 - 254
  • [8] The Method of Information Security Based on Micrographics
    Dronjuk, Ivanna
    Nazarkevych, Mariya
    Medykovski, Nikola
    Gorodetska, Olena
    COMPUTER NETWORKS, 2012, 291 : 207 - 215
  • [9] Application of hospital information security intrusion detection system based on the new NPRIM algorithm
    Li, Xingshan
    Xu, Min
    PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON INFORMATION ENGINEERING FOR MECHANICS AND MATERIALS, 2016, 97 : 445 - 449
  • [10] An Effective Algorithm of Outlier Detection Based on Clustering
    Xia, Qingsong
    Xing, Changzheng
    Li, Na
    INTERNET OF THINGS-BK, 2012, 312 : 346 - 351