Security detection of network intrusion: application of cluster analysis method

被引:0
|
作者
Yang, W. H. [1 ]
机构
[1] Shandong Polytech, Railway Signal & Informat Engn Dept, Jinan 250104, Shandong, Peoples R China
关键词
clustering analysis; K-means; cross entropy; network intrusion;
D O I
10.18287/412-6179-CO-657
中图分类号
O43 [光学];
学科分类号
070207 ; 0803 ;
摘要
In order to resist network malicious attacks, this paper briefly introduced the network intrusion detection model and K-means clustering analysis algorithm, improved them, and made a simulation analysis on two clustering analysis algorithms on MATLAB software. The results showed that the improved K-means algorithm could achieve central convergence faster in training, and the mean square deviation of clustering center was smaller than the traditional one in convergence. In the detection of normal and abnormal data, the improved K-means algorithm had higher accuracy and lower false alarm rate and missing report rate. In summary, the improved K-means algorithm can be applied to network intrusion detection.
引用
收藏
页码:660 / 664
页数:5
相关论文
共 50 条
  • [1] Network and Information Security, and Intrusion Detection System Analysis
    Wu, Ying
    2013 INTERNATIONAL CONFERENCE ON EDUCATION AND EDUCATIONAL RESEARCH (EER 2013), 2013, 1 : 130 - 134
  • [2] Network intrusion detection: Evaluating cluster, discriminant, and logit analysis
    Katos, Vasilios
    INFORMATION SCIENCES, 2007, 177 (15) : 3060 - 3073
  • [3] Technical Analysis of Network Intrusion Detection System on the Information Security
    Yu, Sheng
    2015 3RD INTERNATIONAL CONFERENCE ON SOCIAL SCIENCES RESEARCH (SSR 2015), 2015, 13 : 190 - 194
  • [4] Network security monitoring - Intrusion detection
    Davis, J
    Hill, E
    Spradley, L
    Wright, M
    Scherer, W
    Zhang, YY
    2003 IEEE SYSTEMS & INFORMATION ENGINEERING DESIGN SYMPOSIUM, 2003, : 241 - 246
  • [5] Application of Generalized Regression Neural Network in Cloud Security Intrusion Detection
    Gao, Feng
    2017 INTERNATIONAL CONFERENCE ON ROBOTS & INTELLIGENT SYSTEM (ICRIS), 2017, : 54 - 57
  • [6] APPLICATION OF CLUSTER ANALYSIS TO DETECTION OF SUBTLE VARIATION IN A GRANITIC INTRUSION
    JOYCE, AS
    CHEMICAL GEOLOGY, 1973, 11 (04) : 297 - 306
  • [7] cFEM: a cluster based feature extraction method for network intrusion detection
    Mazumder, Md. Mumtahin Habib Ullah
    Kadir, Md. Eusha
    Sharmin, Sadia
    Islam, Md. Shariful
    Alam, Muhammad Mahbub
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2023, 22 (05) : 1355 - 1369
  • [8] cFEM: a cluster based feature extraction method for network intrusion detection
    Md. Mumtahin Habib Ullah Mazumder
    Md. Eusha Kadir
    Sadia Sharmin
    Md. Shariful Islam
    Muhammad Mahbub Alam
    International Journal of Information Security, 2023, 22 : 1355 - 1369
  • [9] Research on Network Security Intrusion Detection Method Based on Optimization Algorithm and Neural Network
    Li, Jie
    Li, Jing
    International Journal of Network Security, 2024, 26 (01) : 68 - 73
  • [10] An Intrusion Detection Technique Based on Change in Hurst Parameter with Application to Network Security
    Akujuobi, C. M.
    Ampah, N. K.
    Sadiku, Matthew N. O.
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2007, 7 (05): : 55 - 64