Application of clustering analysis in Intrusion Detection

被引:1
作者
Zhang, Yifan [1 ]
Li, Xingshan [1 ]
Xu, Min [1 ]
机构
[1] Luo He Med Coll, Luohe 462000, Peoples R China
来源
3RD INTERNATIONAL CONFERENCE ON INTELLIGENT ENERGY AND POWER SYSTEMS (IEPS 2017) | 2017年
关键词
Cluster; Analysis Techniques; Boundary Detection; Intrusion Detection;
D O I
10.23977/ieps.2017.1021
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Clustering technology and boundary point detection technology and its application in intrusion detection system are introduced in this paper from three aspects, which are the application of clustering analysis, boundary detection and clustering analysis in Intrusion Detection System. The data processing and the requirement of clustering algorithm for intrusion detection system are introduced in detail. Analyzed the result of the experiment environment and experiment, further validation of this project is based on the improved NPRIM algorithm applied to intrusion detection is effective and feasible.
引用
收藏
页码:149 / 154
页数:6
相关论文
共 5 条
[1]   Data preprocessing for anomaly based network intrusion detection: A review [J].
Davis, Jonathan J. ;
Clark, Andrew J. .
COMPUTERS & SECURITY, 2011, 30 (6-7) :353-375
[2]   A cascaded classifier approach for improving detection rates on rare attack categories in network intrusion detection [J].
Khor, Kok-Chin ;
Ting, Choo-Yee ;
Phon-Amnuaisuk, Somnuk .
APPLIED INTELLIGENCE, 2012, 36 (02) :320-329
[3]   A novel hybrid intrusion detection method integrating anomaly detection with misuse detection [J].
Kim, Gisung ;
Lee, Seungmin ;
Kim, Sehun .
EXPERT SYSTEMS WITH APPLICATIONS, 2014, 41 (04) :1690-1700
[4]   An intelligent algorithm with feature selection and decision rules applied to anomaly intrusion detection [J].
Lin, Shih-Wei ;
Ying, Kuo-Ching ;
Lee, Chou-Yuan ;
Lee, Zne-Jung .
APPLIED SOFT COMPUTING, 2012, 12 (10) :3285-3290
[5]   Effects-based feature identification for network intrusion detection [J].
Louvieris, Panos ;
Clewley, Natalie ;
Liu, Xiaohui .
NEUROCOMPUTING, 2013, 121 :265-273