Intrusion Detection Method Based on Improved Growing Hierarchical Self-Organizing Map

被引:0
作者
张亚平 [1 ]
布文秀 [1 ]
苏畅 [1 ]
王璐瑶 [1 ]
许涵 [2 ]
机构
[1] School of Software,Tianjin University
[2] School of Mathematical Science,Nankai University
关键词
growing hierarchical self-organizing map(GHSOM); hierarchical structure; mutual information; intrusion detection; network security;
D O I
暂无
中图分类号
TP393.08 [];
学科分类号
0839 ; 1402 ;
摘要
Considering that growing hierarchical self-organizing map(GHSOM) ignores the influence of individual component in sample vector analysis, and its accurate rate in detecting unknown network attacks is relatively lower, an improved GHSOM method combined with mutual information is proposed. After theoretical analysis, experiments are conducted to illustrate the effectiveness of the proposed method by accurately clustering the input data. Based on different clusters, the complex relationship within the data can be revealed effectively.
引用
收藏
页码:334 / 338
页数:5
相关论文
共 50 条
[31]   Research and application of intrusion detection method based on hierarchical features [J].
Xie, Xin ;
Jiang, Xunyi ;
Wang, Weiru ;
Wang, Bin ;
Wan, Tiancheng ;
Tang, Wenliang ;
Wang, Xianmin .
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2022, 34 (16)
[32]   A Fusional Intrusion Detection Method Based on the Hierarchical Filtering and Progressive Detection Model [J].
Gao, Xueqin ;
Wu, Qian ;
Cai, Junhui ;
Li, Qifeng .
IEEE ACCESS, 2023, 11 :131409-131417
[33]   An improved algorithm for building self-organizing feedforward neural networks [J].
Qiao, Junfei ;
Li, Sanyi ;
Han, Honggui ;
Wang, Dianhui .
NEUROCOMPUTING, 2017, 262 :28-40
[34]   Design on SimpliciTI based self-organizing network [J].
Yin Zhouping .
INFORMATION SCIENCE AND MANAGEMENT ENGINEERING, VOLS 1-3, 2014, 46 :1229-1236
[35]   An Intrusion Detection Method Based on Hierarchical Feature Learning and Its Application [J].
Xie, Xin ;
Jiang, Xunyi ;
Wang, Weiru ;
Wang, Bin ;
Wan, Tiancheng ;
Yang, Hao .
CYBERSPACE SAFETY AND SECURITY, PT I, 2020, 11982 :13-20
[36]   An improved unsupervised clustering-based intrusion detection method [J].
Hai, YJ ;
Wu, Y ;
Wang, GY .
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2005, 2005, 5812 :52-60
[37]   An improved content-based outlier detection method for ICS intrusion detection [J].
Huiping Li ;
Bin Wang ;
Xin Xie .
EURASIP Journal on Wireless Communications and Networking, 2020
[38]   An improved content-based outlier detection method for ICS intrusion detection [J].
Li, Huiping ;
Wang, Bin ;
Xie, Xin .
EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2020, 2020 (01)
[39]   Self-similarity based lightweight intrusion detection method [J].
Kwon, Hyukmin ;
Kim, Eunjin ;
Yu, Song Jin ;
Kim, Huy Kang .
INFORMATION-AN INTERNATIONAL INTERDISCIPLINARY JOURNAL, 2011, 14 (11) :3683-3690
[40]   Feature Grouping for Intrusion Detection System Based on Hierarchical Clustering [J].
Song, Jingping ;
Zhu, Zhiliang ;
Price, Chris .
AVAILABILITY, RELIABILITY, AND SECURITY IN INFORMATION SYSTEMS, 2014, 8708 :270-+