An unsupervised intrusion detection method combined clustering with chaos simulated annealing

被引:0
|
作者
Ni, Lin [1 ]
Zheng, Hong-Ying [2 ]
机构
[1] Chongqing Univ, Coll Mech Engn, Chongqing 400030, Peoples R China
[2] Chongqing Univ, Sch Comp Sci, Chongqing 400030, Peoples R China
来源
PROCEEDINGS OF 2007 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7 | 2007年
关键词
chaos; intrusion detection; partitioned clustering; simulated annealing;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Keeping networks security has never been such an imperative task as today. Threats come from hardware failures, software flaws, tentative probing and malicious attacks. In this paper, a new detection method, Intrusion Detection based on Unsupervised Clustering and Chaos Simulated Annealing algorithm (IDCCSA), is proposed. As a novel optimization technique, chaos has gained much attention and some applications during the past decade. For a given energy or cost function, by following chaotic ergodic orbits, a chaotic dynamic system may eventually reach the global optimum or its good approximation with high probability. To enhance the performance of simulated annealing which is to find a near-optimal partitioning clustering, simulated annealing algorithm is proposed by incorporating chaos. Experiments with KDD cup 1999 show that the simulated annealing combined with chaos can effectively enhance the searching efficiency and greatly improve the detection quality.
引用
收藏
页码:3217 / +
页数:2
相关论文
共 50 条
  • [21] Research of Intrusion Detection Method Based on Ant Colony Clustering
    Yue Qiang
    Hu Zhongyu
    Shen Shikai
    Zhang Dawei
    PROCEEDINGS OF THE 2016 4TH INTERNATIONAL CONFERENCE ON MACHINERY, MATERIALS AND COMPUTING TECHNOLOGY, 2016, 60 : 6 - 11
  • [22] An anomaly intrusion detection method by clustering normal user behavior
    Oh, SH
    Lee, WS
    COMPUTERS & SECURITY, 2003, 22 (07) : 596 - 612
  • [23] A Hybrid Unsupervised Clustering-Based Anomaly Detection Method
    Pu, Guo
    Wang, Lijuan
    Shen, Jun
    Dong, Fang
    TSINGHUA SCIENCE AND TECHNOLOGY, 2021, 26 (02) : 146 - 153
  • [24] A Clustering-SVM Ensemble Method for Intrusion Detection System
    Liang, Dong
    Liu, Qinrang
    Zhao, Bo
    Zhu, Zhihua
    Liu, Dongpei
    2019 8TH INTERNATIONAL SYMPOSIUM ON NEXT GENERATION ELECTRONICS (ISNE), 2019,
  • [25] A Clustering-Based Method for Intrusion Detection in Web Servers
    Pereira, Hermano
    Jamhour, Edgard
    2013 20TH INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS (ICT), 2013,
  • [26] CHAOTIC SIMULATED ANNEALING BY A NEURAL-NETWORK MODEL WITH TRANSIENT CHAOS
    CHEN, LN
    AIHARA, K
    NEURAL NETWORKS, 1995, 8 (06) : 915 - 930
  • [27] A clustering algorithm for intrusion detection
    Wang, Q
    Megalooikonomou, V
    DATA MINING, INTRUSION DETECTION, INFORMATION ASSURANCE, AND DATA NETWORKS SECURITY 2005, 2005, 5812 : 31 - 38
  • [28] An Intrusion Detection Method Based on Damped Window of Data Stream Clustering
    Li, Shengnan
    Zhou, Xiaofeng
    2017 NINTH INTERNATIONAL CONFERENCE ON INTELLIGENT HUMAN-MACHINE SYSTEMS AND CYBERNETICS (IHMSC 2017), VOL 1, 2017, : 211 - 214
  • [29] An intrusion detection method for internet of things based on suppressed fuzzy clustering
    Liu, Liqun
    Xu, Bing
    Zhang, Xiaoping
    Wu, Xianjun
    EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2018,
  • [30] An adaptive intrusion detection algorithm based on clustering and kernel-method
    Lee, Hansung
    Chung, Yongwha
    Park, Daihee
    ADVANCES IN KNOWLEDGE DISCOVERY AND DATA MINING, PROCEEDINGS, 2006, 3918 : 603 - 610