A Network Intrusion Detection Algorithm Based on Outlier Mining

被引:0
|
作者
Ding, Tianyi [1 ]
Zhang, Min [1 ]
He, Dongjie [2 ]
机构
[1] Elect Engn Inst, Hefei 230037, Anhui, Peoples R China
[2] Harbin Inst Technol, Harbin 150001, Heilongjiang, Peoples R China
来源
COMMUNICATIONS, SIGNAL PROCESSING, AND SYSTEMS | 2019年 / 463卷
关键词
Intrusion detection; Outliers; Spectral clustering; LOF algorithm; Data mining; SYSTEMS;
D O I
10.1007/978-981-10-6571-2_147
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
A spectral clustering and Local Outlier Factor (LOF) based outlier mining algorithm, which is aiming to solve network intrusion detection problem, is proposed in this paper. First of all, the structure of similarity matrix method in spectral clustering is used for data preprocessing to find out the smaller similarity objects. During this process, the pruning of the outliers is completed, and a set of candidate outliers is obtained. Then, we calculate the local outlier factor of each data object in this set through LOF algorithm. And the final results of detection of outliers are acquired. The experimental results show that the proposed algorithm improves the accuracy of detecting outliers and the effectiveness of network intrusion detection.
引用
收藏
页码:1229 / 1236
页数:8
相关论文
共 50 条
  • [1] Clustering Algorithm Based on Outlier Detection for Anomaly Intrusion Detection
    Yin, Shang-Nan
    Kang, Ho-Seok
    Kim, Sung-Ryul
    JOURNAL OF INTERNET TECHNOLOGY, 2016, 17 (02): : 291 - 299
  • [2] Applied Research on Data Mining Algorithm in Network Intrusion Detection
    Xue, Ming
    Zhu, Changjun
    FIRST IITA INTERNATIONAL JOINT CONFERENCE ON ARTIFICIAL INTELLIGENCE, PROCEEDINGS, 2009, : 275 - +
  • [3] Research of Outlier Mining Based Adaptive Intrusion Detection Techniques
    Ke, Fang Yu
    Yan, Fu
    Lin, Zhou Jun
    THIRD INTERNATIONAL CONFERENCE ON KNOWLEDGE DISCOVERY AND DATA MINING: WKDD 2010, PROCEEDINGS, 2010, : 552 - 555
  • [4] A novel outlier detection scheme for network intrusion detection systems
    Prakobphol, Komsit
    Zhan, Justin
    PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON INFORMATION SECURITY AND ASSURANCE, 2008, : 555 - 560
  • [5] The Research on the Application of Association Rules Mining Algorithm in Network Intrusion Detection
    Ye Changguo
    Wei Nianzhong
    Wang Tailei
    Zhang Qin
    Zhu Xiaorong
    PROCEEDINGS OF THE FIRST INTERNATIONAL WORKSHOP ON EDUCATION TECHNOLOGY AND COMPUTER SCIENCE, VOL II, 2009, : 849 - +
  • [6] Design of Intrusion Detection System Based on Data Mining Algorithm
    Song, Changxin
    Ma, Ke
    PROCEEDINGS OF THE 2009 INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING SYSTEMS, 2009, : 370 - 373
  • [7] Algorithm of Intrusion Detection Based on Data Mining and Its Implementation
    孙海彬
    徐良贤
    陈彦华
    Journal of DongHua University, 2004, (05) : 88 - 92
  • [8] A Deviation Based Outlier Intrusion Detection System
    Pareek, Vikas
    Mishra, Aditi
    Sharma, Arpana
    Chauhan, Rashmi
    Bansal, Shruti
    RECENT TRENDS IN NETWORK SECURITY AND APPLICATIONS, 2010, 89 : 395 - 401
  • [9] A Model of Intrusion Detection Based on Data Mining in Campus Network
    Qi Bei
    Dong Yun-feng
    NATIONAL CONFERENCE OF HIGHER VOCATIONAL AND TECHNICAL EDUCATION ON COMPUTER INFORMATION, 2010, : 317 - +
  • [10] Network intrusion detection based on system calls and data mining
    Tian, Xinguang
    Cheng, Xueqi
    Duan, Miyi
    Liao, Rui
    Chen, Hong
    Chen, Xiaojuan
    FRONTIERS OF COMPUTER SCIENCE IN CHINA, 2010, 4 (04): : 522 - 528