Research on Anomaly Detection Method Based on DBSCAN Clustering Algorithm

被引:15
作者
Deng, Dingsheng [1 ]
机构
[1] Sichuan Univ Nationalities, Kangding 626001, Sichuan, Peoples R China
来源
2020 5TH INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE, COMPUTER TECHNOLOGY AND TRANSPORTATION (ISCTT 2020) | 2020年
关键词
Network Security; Intrusion Detection; Anomaly Detection; DBSCAN Clustering Algorithm;
D O I
10.1109/ISCTT51595.2020.00083
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
With the rapid development of Internet technology and communication technology, more and more computer systems and networks have been maliciously attacked by intruders. Network security has been seriously threatened to a certain extent, and network security technology has also attracted more and more attention from the public. As a security protection technology for actively monitoring network data, intrusion detection technology effectively compensates for the defects of traditional security protection technologies such as firewalls and data encryption, and has become an important research field in network security. Based on this, it is very important to design the security mechanism of the system to prevent unauthorized access to system resources and data. This paper uses a DBSCAN algorithm for anomaly detection clustering algorithm. Algorithms that can be used for massive data processing have become a research hotspot in anomaly detection. Normal behavior profiles are formed on audit records and adjusted in time as program behavior changes. Experimental results show that, compared with other algorithms, anomaly detection based on the DBSCAN algorithm can improve the detection rate of the data set, and significantly improve the accuracy of anomaly detection.
引用
收藏
页码:439 / 442
页数:4
相关论文
共 11 条
  • [1] Chen Liyue, 2015, MICROCOMPUTER APPL, P70
  • [2] Na Yin, 2017, COMPUTER SCI, P45
  • [3] Ruan Jiakun, 2019, IND CONTROL COMPUTER, P75
  • [4] Wang Chenxi, 2019, ELECT TECHNOLOGY SOF, P188
  • [5] Wang Pu, 2018, J U ELECT SCI TECHNO, P71
  • [6] Weiwu R, 2018, J JILIN U, P127
  • [7] YAN Y, 2019, HIGH VOLTAGE TECHNOL, P208, DOI DOI 10.1109/ISCID.2019.10131
  • [8] 基于流数据聚类算法的电力大数据异常检测
    于小青
    齐林海
    [J]. 电力信息与通信技术, 2020, 18 (03) : 8 - 14
  • [9] Zhang Dandan, 2019, MICROELECTRONICS COM, P49
  • [10] Zhao M, 2020, COMPUT NETW, V46, P68