Security detection of network intrusion: application of cluster analysis method

被引:0
|
作者
Yang, W. H. [1 ]
机构
[1] Shandong Polytech, Railway Signal & Informat Engn Dept, Jinan 250104, Shandong, Peoples R China
关键词
clustering analysis; K-means; cross entropy; network intrusion;
D O I
10.18287/412-6179-CO-657
中图分类号
O43 [光学];
学科分类号
070207 ; 0803 ;
摘要
In order to resist network malicious attacks, this paper briefly introduced the network intrusion detection model and K-means clustering analysis algorithm, improved them, and made a simulation analysis on two clustering analysis algorithms on MATLAB software. The results showed that the improved K-means algorithm could achieve central convergence faster in training, and the mean square deviation of clustering center was smaller than the traditional one in convergence. In the detection of normal and abnormal data, the improved K-means algorithm had higher accuracy and lower false alarm rate and missing report rate. In summary, the improved K-means algorithm can be applied to network intrusion detection.
引用
收藏
页码:660 / 664
页数:5
相关论文
共 50 条
  • [21] The application of bioinformatics to network intrusion detection
    Takeda, K
    39TH ANNUAL 2005 INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY, PROCEEDINGS, 2005, : 130 - 132
  • [22] Quick feature selection method and its application on network intrusion detection
    Chen, Tie-Ming
    Ma, Ji-Xia
    Xuan, Yi-Guang
    Cai, Jia-Mei
    Tongxin Xuebao/Journal on Communications, 2010, 31 (9 A): : 233 - 238
  • [23] A Network Intrusion Detection Method using Independent Component Analysis
    Yang, Dayu
    Qi, Hairong
    19TH INTERNATIONAL CONFERENCE ON PATTERN RECOGNITION, VOLS 1-6, 2008, : 591 - 594
  • [24] An Exhaustive Research on the Application of Intrusion Detection Technology in Computer Network Security in Sensor Networks
    Wang, Yajing
    Ma, Juan
    Sharma, Ashutosh
    Singh, Pradeep Kumar
    Gaba, Gurjot Singh
    Masud, Mehedi
    Baz, Mohammed
    JOURNAL OF SENSORS, 2021, 2021
  • [25] Design and Analysis of a Method for Synoptic Level Network Intrusion Detection
    Hlavacek, Deanna T.
    Chang, J. Morris
    39TH ANNUAL IEEE COMPUTERS, SOFTWARE AND APPLICATIONS CONFERENCE (COMPSAC 2015), VOL 2, 2015, : 516 - 524
  • [26] Analysis of Security Techniques for Detecting Suspicious Activities and Intrusion Detection in Network Traffic
    Department of Computer Sciences, City University of Science and Information Technology, Peshawar, Pakistan
    不详
    Int. J. Comput. Sci. Issues, 1600, 2 (259-265):
  • [27] Application of Neural Network and Cluster Analysis in Anomaly Detection
    Wu, Xudong
    Liu, Bingxiang
    Li, Yingxi
    NETWORK COMPUTING AND INFORMATION SECURITY, 2012, 345 : 63 - +
  • [28] A Novel Method for Network Intrusion Detection
    Wang, Hongmin
    Wei, Qiang
    Xie, Yaobin
    SCIENTIFIC PROGRAMMING, 2022, 2022
  • [29] Cloud computing for network security intrusion detection system
    Yang, J. (jinnyang@163.com), 1600, Academy Publisher (08):
  • [30] Campus Network Security Program Based on Snort Network Security Intrusion Detection System
    Ling, Jia
    MATERIALS SCIENCE AND INFORMATION TECHNOLOGY, PTS 1-8, 2012, 433-440 : 3235 - 3240