Design of network intrusion detection system based on parallel DPC clustering algorithm

被引:4
作者
Wang, Jing [1 ]
Han, Dezhi [1 ]
机构
[1] Shanghai Maritime Univ, Sch Informat Engn, 1550 Pudong Ave, Shanghai 201306, Peoples R China
基金
中国国家自然科学基金;
关键词
DPC; clustering; network intrusion detection; Spark; parallel; DENSITY PEAKS; FAST SEARCH; EFFICIENT; SCHEME; FIND;
D O I
10.1504/IJES.2020.109969
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
With the advent of the era of big data, network intrusion detection systems based on K-means algorithm cannot meet the detection efficiency and detection speed requirements in big data environment. The DPC algorithm can be applied to high-dimensional network traffic and large-scale data application environments, but there are problems of large calculated amount and limited serial processing capability. Aiming at the problems of DPC algorithm, the DPC algorithm is adjusted firstly to improve the clustering accuracy of the algorithm. Then, the DPC algorithm a parallelised on the Spark platform, so that the processing ability and running speed of the DPC algorithm is greatly improved by running in parallel in the memory of multiple virtual machines. The experimental results show that the network intrusion detection system based on parallel DPC clustering algorithm has higher detection rate and lower false rate. The parallelisation clustering efficiency is much higher than the single-computer clustering efficiency.
引用
收藏
页码:318 / 327
页数:10
相关论文
共 21 条
[1]  
[Anonymous], 2019, COMPUTER ENG APPL, DOI DOI 10.1007/978-981-13-9109-5_2
[2]   Partitioning road networks using density peak graphs: Efficiency vs. accuracy [J].
Anwar, Tarique ;
Liu, Chengfei ;
Vu, Hai L. ;
Leckie, Christopher .
INFORMATION SYSTEMS, 2017, 64 :22-40
[3]   Adaptive fuzzy clustering by fast search and find of density peaks [J].
Bie, Rongfang ;
Mehmood, Rashid ;
Ruan, Shanshan ;
Sun, Yunchuan ;
Dawood, Hussain .
PERSONAL AND UBIQUITOUS COMPUTING, 2016, 20 (05) :785-793
[4]   An Efficient and Safe Road Condition Monitoring Authentication Scheme Based on Fog Computing [J].
Cui, Mingming ;
Han, Dezhi ;
Wang, Jun .
IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (05) :9076-9084
[5]   Study on density peaks clustering based on k-nearest neighbors and principal component analysis [J].
Du, Mingjing ;
Ding, Shifei ;
Jia, Hongjie .
KNOWLEDGE-BASED SYSTEMS, 2016, 99 :135-145
[6]  
Feng G-l., 2018, COMPUTER SCI, V45, P349
[7]  
[巩树凤 Gong Shufeng], 2016, [计算机研究与发展, Journal of Computer Research and Development], V53, P1400
[8]   On one-time cookies protocol based on one-time password [J].
He, Junhui ;
Han, Dezhi ;
Li, Kuan-Ching .
SOFT COMPUTING, 2020, 24 (08) :5657-5670
[9]  
Kernel M.K., 1999, ADV NEURAL INFORM PR, V11, P536
[10]  
Li Lijuan, 2012, Computer Engineering and Applications, V48, P86, DOI 10.3778/j.issn.1002-8331.2012.02.024