Security detection of network intrusion: application of cluster analysis method

被引:0
|
作者
Yang, W. H. [1 ]
机构
[1] Shandong Polytech, Railway Signal & Informat Engn Dept, Jinan 250104, Shandong, Peoples R China
关键词
clustering analysis; K-means; cross entropy; network intrusion;
D O I
10.18287/412-6179-CO-657
中图分类号
O43 [光学];
学科分类号
070207 ; 0803 ;
摘要
In order to resist network malicious attacks, this paper briefly introduced the network intrusion detection model and K-means clustering analysis algorithm, improved them, and made a simulation analysis on two clustering analysis algorithms on MATLAB software. The results showed that the improved K-means algorithm could achieve central convergence faster in training, and the mean square deviation of clustering center was smaller than the traditional one in convergence. In the detection of normal and abnormal data, the improved K-means algorithm had higher accuracy and lower false alarm rate and missing report rate. In summary, the improved K-means algorithm can be applied to network intrusion detection.
引用
收藏
页码:660 / 664
页数:5
相关论文
共 50 条
  • [31] Study on the Evidence Collection for Network Security Intrusion Detection
    Wang, Xindong
    International Journal of Network Security, 2022, 24 (06) : 1002 - 1007
  • [32] The neuron security of joint defense for network intrusion detection
    Wu, JS
    37TH ANNUAL 2003 INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY, PROCEEDINGS, 2003, : 501 - 507
  • [33] Network security intrusion target detection system in the cloud
    Srirangam, Durga Prasad
    Salina, Adinarayana
    Bapu, B. R. Tapas
    Partheeban, N.
    INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2024, 16 (05) : 602 - 613
  • [34] Study of Intrusion Detection Systems (IDSs) in Network Security
    Wu Junqi
    Hu Zhengbing
    2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 4532 - +
  • [35] The Application of Genetic Neural Network in Network Intrusion Detection
    Jiang, Hua
    Ruan, Junhu
    JOURNAL OF COMPUTERS, 2009, 4 (12) : 1223 - 1230
  • [36] Research on machine learning method and its application technology in intrusion information security detection
    Fang, Weijian
    Tan, Xiaoling
    Wilbur, Dominic
    JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2020, 38 (02) : 1549 - 1558
  • [37] Dynamic application-layer protocol analysis for network intrusion detection
    Dreger, Holger
    Feldmann, Anja
    Mai, Michael
    Paxson, Vern
    Sommer, Robin
    USENIX Association Proceedings of the 15th USENIX Security Symposium, 2006, : 257 - 272
  • [38] Novel intrusion detection method based on Principle Component Analysis in computer security
    Wang, W
    Guan, XH
    Zhang, XL
    ADVANCES IN NEURAL NETWORKS - ISNN 2004, PT 2, 2004, 3174 : 657 - 662
  • [39] INTRUSION DETECTION - AN APPLICATION OF EXPERT SYSTEMS TO COMPUTER SECURITY
    BAUER, DS
    EICHELMAN, FR
    HERRERA, RM
    IRGON, AE
    1989 INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY, 1989, : 97 - 100
  • [40] The Improvement of Cluster Analysis in Intrusion Detection System
    Su, Lin-Ping
    Zhang, Jian-An
    2017 10TH INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTATION TECHNOLOGY AND AUTOMATION (ICICTA 2017), 2017, : 274 - 277