The Research of Intrusion Detection Based on Mixed Clustering Algorithm

被引:0
作者
Liu, Nanyan [1 ]
机构
[1] Xian Univ Sci & Technol, Coll Comp Sci & Technol, Xian 710054, Peoples R China
来源
COMPUTATIONAL INTELLIGENCE AND INTELLIGENT SYSTEMS | 2012年 / 316卷
关键词
Intrusion Detection; Cluster Analysis; Dissimilarity Matrix; Rough Set; Genetic Algorithm;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Nowadays, network security problems are increasing prominent, and how to find intrusion activities quickly and efficiently has become important to the security of system and network resource. we use the feature extraction and feature selection method of rough set and pattern recognition in the feature selection of network intrusion detection and introducing clustering method and genetic algorithm for network intrusion detection. First, we use the feature extraction which based on rough sets theory for the experimental data set. we use a mixed data dissimilarity algorithm and combining it with k-medoids algorithm. Makes the clustering algorithm can deal with a mixed data set which include continuous and discrete data. Last, traditional k-medoids clustering algorithm is difficult to determine the number of existing clustering, sensitive to initial value and easy to fall into local optimal solution. So we present an unsupervised clustering algorithm which combing with genetic algorithm and k-medoids clustering algorithm. All of these methods are efficiently to solve the defects of traditional k-medoids algorithm. And the algorithm can distinguish new attack from already existed attack.
引用
收藏
页码:92 / 100
页数:9
相关论文
共 10 条
[1]  
[Anonymous], 2001, P ACM CSS WORKSH DAT
[2]  
Eskin Eleazar., 2002, DATA MINING SECURITY
[3]   Clustering data streams: Theory and practice [J].
Guha, S ;
Meyerson, A ;
Mishra, N ;
Motwani, R ;
O'Callaghan, L .
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2003, 15 (03) :515-528
[4]   ROCK: A robust clustering algorithm for categorical attributes [J].
Guha, S ;
Rastogi, R ;
Shim, K .
15TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING, PROCEEDINGS, 1999, :512-521
[5]  
Han J.W., 2007, data mining concepts and technology
[6]   Squeezer: An efficient algorithm for clustering categorical data [J].
He, ZY ;
Xu, XF ;
Deng, SC .
JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2002, 17 (05) :611-624
[7]  
Hu C, 2006, NETWORK INTRUSION DE
[8]  
Jiang S., 2005, COMPUTER ENG APPL, V11, P146
[9]  
*KDD99, 1999, KDD99 CUP DAT
[10]  
Wang Q., IEEE T INSTRUMENTATI