A K-means algorithm based on characteristics of density applied to network intrusion detection

被引:11
作者
Xu, Jing [1 ]
Han, Dezhi [2 ]
Li, Kuan-Ching [3 ]
Jiang, Hai [4 ]
机构
[1] Shanghai Maritime Univ, Software Engn, Sch Informat Engn, Shanghai 201306, Peoples R China
[2] Shanghai Maritime Univ, Comp Sci & Engn, Shanghai 201306, Peoples R China
[3] Providence Univ, Taichung 43301, Taiwan
[4] Arkansas State Univ, Dept Comp Sci, Jonesboro, AR 72467 USA
关键词
Network security; K-means; Kd-tree; Network intrusion detection; SEARCH;
D O I
10.2298/CSIS200406014X
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
K-means algorithms are a group of popular unsupervised algorithms widely used for cluster analysis. However, the results of traditional K-means clustering algorithms are greatly affected by the initial clustering center, with unstable accuracy and low speed, which makes the algorithm hard to meet the requirements for Big Data. In this paper, a modernized version of the K-means algorithm based on density to select the initial seed of clustering is proposed. Firstly, Kd-tree is used to divide the hyper-rectangle space, so those points close to each other are grouped into the same sub-tree during data pre-processing, and the generalized information is stored in the tree structure. Besides, an improved Kd-tree nearest neighbor search is used in the K-means algorithm to prune the search space and optimize the operation for speedup. The clustering results show that the clusters are stable and accurate when the numbers of clusters and iterations are constant. Experimental results in the network intrusion detection case show that the improved version of the K-means algorithms performs better in terms of detection rate and false rate.
引用
收藏
页码:665 / 687
页数:23
相关论文
共 36 条
  • [1] Aliahmadipour L., 2016, INT J INTELL SYST, V31
  • [2] [Anonymous], P 6 INT C KNOWL DISC
  • [3] [Anonymous], 1997, P 23 VER LARG DAT C
  • [4] [Anonymous], DATA MINING KNOWLEDG
  • [5] MULTIDIMENSIONAL BINARY SEARCH TREES USED FOR ASSOCIATIVE SEARCHING
    BENTLEY, JL
    [J]. COMMUNICATIONS OF THE ACM, 1975, 18 (09) : 509 - 517
  • [6] Bris R. L., COMPUTERS GEOSCIENCE, V52, P234
  • [7] An Efficient and Safe Road Condition Monitoring Authentication Scheme Based on Fog Computing
    Cui, Mingming
    Han, Dezhi
    Wang, Jun
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (05) : 9076 - 9084
  • [8] Deshmukh D. H., 2015, IMPROVING CLASSIFICA
  • [9] Gulnashin F., NEW DETERMINISTIC ME
  • [10] Guttman A., 1984, SIGMOD Record, V14, P47, DOI 10.1145/971697.602266