Security detection of network intrusion: application of cluster analysis method

被引:0
|
作者
Yang, W. H. [1 ]
机构
[1] Shandong Polytech, Railway Signal & Informat Engn Dept, Jinan 250104, Shandong, Peoples R China
关键词
clustering analysis; K-means; cross entropy; network intrusion;
D O I
10.18287/412-6179-CO-657
中图分类号
O43 [光学];
学科分类号
070207 ; 0803 ;
摘要
In order to resist network malicious attacks, this paper briefly introduced the network intrusion detection model and K-means clustering analysis algorithm, improved them, and made a simulation analysis on two clustering analysis algorithms on MATLAB software. The results showed that the improved K-means algorithm could achieve central convergence faster in training, and the mean square deviation of clustering center was smaller than the traditional one in convergence. In the detection of normal and abnormal data, the improved K-means algorithm had higher accuracy and lower false alarm rate and missing report rate. In summary, the improved K-means algorithm can be applied to network intrusion detection.
引用
收藏
页码:660 / 664
页数:5
相关论文
共 50 条
  • [41] REAL-TIME TRAFFIC DETECTION and ANALYSIS of NETWORK SECURITY INTRUSION ATTACK: SNORT INTRUSION PREVENTION SYSTEM
    Zhou A.L.
    Telecommunications and Radio Engineering (English translation of Elektrosvyaz and Radiotekhnika), 2020, 79 (12): : 1055 - 1062
  • [42] The application of rough sets on network intrusion detection
    Liu, Cui-Juan
    PROCEEDINGS OF 2007 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2007, : 3657 - 3660
  • [43] Analysis of Autoencoders for Network Intrusion Detection
    Song, Youngrok
    Hyun, Sangwon
    Cheong, Yun-Gyung
    SENSORS, 2021, 21 (13)
  • [44] A Network Intrusion Security Detection Method Using BiLSTM-CNN in Big Data Environment
    Wang, Hong
    JOURNAL OF INFORMATION PROCESSING SYSTEMS, 2023, 19 (05): : 688 - 701
  • [45] Application of software fault tree method in intrusion detection system analysis
    Yuan, J
    Long, Y
    Hu, CH
    Huang, Y
    ICEMI 2005: Conference Proceedings of the Seventh International Conference on Electronic Measurement & Instruments, Vol 7, 2005, : 481 - 486
  • [46] Fuzzy mega cluster based anomaly network intrusion detection
    Hubballi, Neminath
    Biswas, Santosh
    Nandi, Sukumar
    2009 INTERNATIONAL CONFERENCE ON NETWORK AND SERVICE SECURITY, 2009, : 82 - 86
  • [47] Network Security and Security Intrusion Agents
    Hasan, Syed Abid
    Hasan, Syed Hamid
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON MANAGEMENT AND ENGINEERING (CME 2014), 2014, : 43 - 52
  • [48] Design of Multimedia Education Network Security and Intrusion Detection System
    Liu, Yansong
    Zhu, Li
    Liu, Feng
    MULTIMEDIA TOOLS AND APPLICATIONS, 2020, 79 (25-26) : 18801 - 18814
  • [49] Intrusion Detection and Prevention using Honeypot Network for Cloud Security
    Negi, Poorvika Singh
    Garg, Aditya
    Lal, Roshan
    PROCEEDINGS OF THE CONFLUENCE 2020: 10TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING, DATA SCIENCE & ENGINEERING, 2020, : 129 - 132
  • [50] A hybrid intrusion detection system design for computer network security
    Aydin, M. Ali
    Zaim, A. Halim
    Ceylan, K. Goekhan
    COMPUTERS & ELECTRICAL ENGINEERING, 2009, 35 (03) : 517 - 526