An unsupervised intrusion detection method combined clustering with chaos simulated annealing

被引:0
|
作者
Ni, Lin [1 ]
Zheng, Hong-Ying [2 ]
机构
[1] Chongqing Univ, Coll Mech Engn, Chongqing 400030, Peoples R China
[2] Chongqing Univ, Sch Comp Sci, Chongqing 400030, Peoples R China
来源
PROCEEDINGS OF 2007 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7 | 2007年
关键词
chaos; intrusion detection; partitioned clustering; simulated annealing;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Keeping networks security has never been such an imperative task as today. Threats come from hardware failures, software flaws, tentative probing and malicious attacks. In this paper, a new detection method, Intrusion Detection based on Unsupervised Clustering and Chaos Simulated Annealing algorithm (IDCCSA), is proposed. As a novel optimization technique, chaos has gained much attention and some applications during the past decade. For a given energy or cost function, by following chaotic ergodic orbits, a chaotic dynamic system may eventually reach the global optimum or its good approximation with high probability. To enhance the performance of simulated annealing which is to find a near-optimal partitioning clustering, simulated annealing algorithm is proposed by incorporating chaos. Experiments with KDD cup 1999 show that the simulated annealing combined with chaos can effectively enhance the searching efficiency and greatly improve the detection quality.
引用
收藏
页码:3217 / +
页数:2
相关论文
共 50 条
  • [31] Genetic and Simulated Annealing Algorithm based on Chaos Variables
    Jiang, Jing
    Tan, Boxue
    Meng, Lidong
    Jiang, Lin
    2009 IEEE INTERNATIONAL CONFERENCE ON AUTOMATION AND LOGISTICS ( ICAL 2009), VOLS 1-3, 2009, : 424 - +
  • [32] An intrusion detection method for internet of things based on suppressed fuzzy clustering
    Liqun Liu
    Bing Xu
    Xiaoping Zhang
    Xianjun Wu
    EURASIP Journal on Wireless Communications and Networking, 2018
  • [33] Clustering using simulated annealing with probabilistic redistribution
    Bandyopadhyay, S
    Maulik, U
    Pakhira, MK
    INTERNATIONAL JOURNAL OF PATTERN RECOGNITION AND ARTIFICIAL INTELLIGENCE, 2001, 15 (02) : 269 - 285
  • [34] Applying KSE-test and K-means clustering towards Scalable Unsupervised Intrusion Detection
    Jirachan, Thanachai
    Piromsopa, Krerk
    PROCEEDINGS OF THE 2015 12TH INTERNATIONAL JOINT CONFERENCE ON COMPUTER SCIENCE AND SOFTWARE ENGINEERING (JCSSE), 2015, : 82 - 87
  • [35] Unsupervised Genetic Algorithm Deployed for Intrusion Detection
    Bankovic, Zorana
    Bojanic, Slobodan
    Nieto, Octavio
    Badii, Atta
    HYBRID ARTIFICIAL INTELLIGENCE SYSTEMS, 2008, 5271 : 132 - 139
  • [36] Application of clustering analysis in Intrusion Detection
    Zhang, Yifan
    Li, Xingshan
    Xu, Min
    3RD INTERNATIONAL CONFERENCE ON INTELLIGENT ENERGY AND POWER SYSTEMS (IEPS 2017), 2017, : 149 - 154
  • [37] A Clustering Algorithm Oriented to Intrusion Detection
    Li Wei
    Yang Zhong-ming
    Chang Ya-ping
    Zhang Bin
    2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (CSE) AND IEEE/IFIP INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING (EUC), VOL 1, 2017, : 862 - 865
  • [38] A Fuzzy Clustering Approach for Intrusion Detection
    Zeng, QingPeng
    Wu, ShuiXiu
    WISM: 2009 INTERNATIONAL CONFERENCE ON WEB INFORMATION SYSTEMS AND MINING, PROCEEDINGS, 2009, : 728 - +
  • [39] Distributed intrusion detection based on clustering
    Zhang, YF
    Xiong, ZY
    Wang, XQ
    Proceedings of 2005 International Conference on Machine Learning and Cybernetics, Vols 1-9, 2005, : 2379 - 2383
  • [40] Network traffic clustering for intrusion detection
    Arina, Nikishova
    Irina, Ananina
    Evgeny, Ananin
    PROCEEDINGS OF THE IV INTERNATIONAL RESEARCH CONFERENCE INFORMATION TECHNOLOGIES IN SCIENCE, MANAGEMENT, SOCIAL SPHERE AND MEDICINE (ITSMSSM 2017), 2017, 72 : 252 - 256