A neighbor propagation clustering algorithm for intrusion detection

被引:0
|
作者
Li, Zheng [1 ]
机构
[1] Li, Zheng
来源
Li, Zheng (lizh_1981@163.com) | 1600年 / International Information and Engineering Technology Association卷 / 34期
关键词
Anomaly detection - Intrusion detection - Statistics - Clustering algorithms - Signal detection;
D O I
10.18280/ria.340311
中图分类号
学科分类号
摘要
引用
收藏
页码:331 / 336
相关论文
共 50 条
  • [1] A clustering algorithm for intrusion detection
    Wang, Q
    Megalooikonomou, V
    [J]. DATA MINING, INTRUSION DETECTION, INFORMATION ASSURANCE, AND DATA NETWORKS SECURITY 2005, 2005, 5812 : 31 - 38
  • [2] An Adaptive Clustering Algorithm for Intrusion Detection
    QIU JuliNormal University of AnshanAnshanChina
    [J]. 现代电子技术, 2007, (02) : 130 - 132
  • [3] A Clustering Algorithm Oriented to Intrusion Detection
    Li Wei
    Yang Zhong-ming
    Chang Ya-ping
    Zhang Bin
    [J]. 2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (CSE) AND IEEE/IFIP INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING (EUC), VOL 1, 2017, : 862 - 865
  • [4] An adaptive clustering algorithm for intrusion detection
    Wu, Guowei
    Yao, Lin
    Yao, Kai
    [J]. 2006 IEEE INTERNATIONAL CONFERENCE ON INFORMATION ACQUISITION, VOLS 1 AND 2, CONFERENCE PROCEEDINGS, 2006, : 1443 - 1447
  • [5] An unsupervised clustering algorithm for intrusion detection
    Guan, Y
    Ghorbani, AA
    Belacel, N
    [J]. ADVANCES IN ARTIFICIAL INTELLIGENCE, PROCEEDINGS, 2003, 2671 : 616 - 617
  • [6] A supervised clustering algorithm for computer intrusion detection
    Xiangyang Li
    Nong Ye
    [J]. Knowledge and Information Systems, 2005, 8 : 498 - 509
  • [7] Intrusion detection based on clustering genetic algorithm
    Zhao, JL
    Zhao, JF
    Li, JJ
    [J]. Proceedings of 2005 International Conference on Machine Learning and Cybernetics, Vols 1-9, 2005, : 3911 - 3914
  • [8] Application of improved Clustering Algorithm in Intrusion Detection
    Dai Kunyu
    Hu Bin
    [J]. 2ND INTERNATIONAL SYMPOSIUM ON COMPUTER NETWORK AND MULTIMEDIA TECHNOLOGY (CNMT 2010), VOLS 1 AND 2, 2010, : 621 - 624
  • [9] A supervised clustering algorithm for computer intrusion detection
    Li, XY
    Ye, N
    [J]. KNOWLEDGE AND INFORMATION SYSTEMS, 2005, 8 (04) : 498 - 509
  • [10] The Application of Clustering Algorithm in Intrusion Detection System
    Ge, Lei
    Zhang, CaiQian
    [J]. ADVANCES IN FUTURE COMPUTER AND CONTROL SYSTEMS, VOL 1, 2012, 159 : 77 - 82