Anomaly detection model based on data stream clustering

被引:21
|
作者
Yin, Chunyong [1 ]
Zhang, Sun [1 ]
Yin, Zhichao [2 ]
Wang, Jin [3 ]
机构
[1] Nanjing Univ Informat Sci & Technol, Jiangsu Collaborat Innovat Ctr Atmospher Environm, Jiangsu Engn Ctr Network Monitoring, Sch Comp & Software, Nanjing, Jiangsu, Peoples R China
[2] 1 Middle Sch, Nanjing, Jiangsu, Peoples R China
[3] Yangzhou Univ, Coll Informat Engn, Yangzhou, Jiangsu, Peoples R China
来源
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS | 2019年 / 22卷 / Suppl 1期
基金
中国国家自然科学基金;
关键词
Intrusion detection; Anomaly detection; Data stream; Clustering;
D O I
10.1007/s10586-017-1066-2
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Intrusion detection provides important protection for network security and anomaly detection as a type of intrusion detection, which can recognize the pattern of normal behaviors and label the behaviors which departure from normal pattern as anomaly behaviors. The updating of network equipment and broadband speed makes the data mining object change from static data sets to dynamic data streams. We think that the traditional methods based on data set do not satisfy the needs of dynamic network environment. The network data stream is temporal and cannot be treated as static data set. The concept and distribution of data objects is variety in different time stamps and the changing is unpredictable. Therefore, we propose an improved data stream clustering algorithm and design the anomaly detection model according to the improved algorithm. The established model can be modified with the changing of data stream and detect anomaly behaviors in time.
引用
收藏
页码:1729 / 1738
页数:10
相关论文
共 50 条
  • [1] Anomaly detection model based on data stream clustering
    Chunyong Yin
    Sun Zhang
    Zhichao Yin
    Jin Wang
    Cluster Computing, 2019, 22 : 1729 - 1738
  • [2] Anomaly intrusion detection based on clustering a data stream
    Oh, Sang-Hyun
    Kang, Jin-Suk
    Bytin, Yung-Cheol
    Jeong, Taikyeong T.
    Lee, Won-Suk
    INFORMATION SECURITY, PROCEEDINGS, 2006, 4176 : 415 - 426
  • [3] Data Stream Clustering for Online Anomaly Detection in Cloud Applications
    Sauvanaud, Carla
    Silvestre, Guthemberg
    Kaaniche, Mohamed
    Kanoun, Karama
    2015 ELEVENTH EUROPEAN DEPENDABLE COMPUTING CONFERENCE (EDCC), 2015, : 120 - 131
  • [4] Data stream clustering algorithm based on the maximum entropy of data dimension and its applications for anomaly detection
    Geng Z.-Q.
    Ji W.
    Han Y.-M.
    Cao J.
    Geng, Zhi-Qiang (gengzhiqiang@mail.buct.edu.cn), 2016, Northeast University (31): : 343 - 348
  • [5] Intrusion detection based on clustering a data stream
    Oh, SH
    Kang, JS
    Byun, YC
    Park, GL
    Byun, SY
    Third ACIS International Conference on Software Engineering Research, Managment and Applications, Proceedings, 2005, : 220 - 227
  • [6] Incremental Stream Clustering for Anomaly Detection and Classification
    Holst, Anders
    Ekman, Jan
    ELEVENTH SCANDINAVIAN CONFERENCE ON ARTIFICIAL INTELLIGENCE (SCAI 2011), 2011, 227 : 100 - 107
  • [7] DeepStream: Autoencoder-based stream temporal clustering and anomaly detection
    Harush, Shimon
    Meidan, Yair
    Shabtai, Asaf
    COMPUTERS & SECURITY, 2021, 106
  • [8] Power Data Anomaly Detection Based on Holt-winters Model and DBSCAN Clustering
    Xiao Y.
    Zheng K.
    Yu Z.
    Zhou M.
    Li S.
    Ma Q.
    Dianwang Jishu/Power System Technology, 2020, 44 (03): : 1099 - 1104
  • [9] Anomaly Detection in Business Process based on Data Stream Mining
    Tavares, Gabriel Marques
    Turrisi da Costa, Victor G.
    Martins, Vinicius Eiji
    Ceravolo, Paolo
    Barbon, Sylvio, Jr.
    PROCEEDINGS OF THE 14TH BRAZILIAN SYMPOSIUM ON INFORMATION SYSTEMS (SBSI2018), 2018, : 120 - 127
  • [10] An algorithm for data stream speed anomaly detection based on RCSW
    Zhan, Y. (zhanying@zjvtit.edu.cn), 2012, Chinese Institute of Electronics (40):