CONSTRUCTION METHOD OF INFORMATION SECURITY DETECTION BASED ON CLUSTERING ALGORITHM

被引:0
|
作者
Chen, Shaobo [1 ]
机构
[1] Shaanxi Univ Technol, Sch Math & Comp Sci, Hanzhong 723000, Peoples R China
来源
关键词
Clustering; Information security; Safety evaluation; PSO algorithm; K; -prototypes; NETWORK; TIME;
D O I
10.12694/scpe.v25i6.3247
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
A method for K-prototype clustering, which can process mixed data types, is proposed first. An algorithm for information security evaluation of hybrid clusters based on K-prototypes was constructed. This method makes full use of the excellent global optimization performance of PSO and effectively solves the defect that the K-protection function quickly falls into local optimization. Simulation results show that the proposed method can effectively prevent local extreme values and improve overall performance.
引用
收藏
页码:5295 / 5301
页数:7
相关论文
共 50 条
  • [31] Studies on information clustering algorithm based on MID
    Ding Shifei
    Shi Zhongzhi
    CHINESE JOURNAL OF ELECTRONICS, 2006, 15 (4A): : 918 - 920
  • [32] A Rough Clustering Algorithm Based on Entropy Information
    Soliman, Omar S.
    Hassanien, Aboul Ella
    El-Bendary, Nashwa
    SOFT COMPUTING MODELS IN INDUSTRIAL AND ENVIRONMENTAL APPLICATIONS, 6TH INTERNATIONAL CONFERENCE SOCO 2011, 2011, 87 : 213 - 222
  • [33] A Novel Unsupervised Outlier Detection Algorithm Based on Mutual Information and Reduced Spectral Clustering
    Huang, Yuehua
    Liu, Wenfen
    Li, Song
    Guo, Ying
    Chen, Wen
    ELECTRONICS, 2023, 12 (23)
  • [34] RETRACTED: Information network security construction based on depth learning and modulus algorithm (Retracted Article)
    Hongfeng, Cui
    JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2020, 38 (06) : 7229 - 7240
  • [35] A novel fuzzy anomaly detection method based on clonal selection clustering algorithm
    Lang, Fenghua
    Li, Jian
    Yang, Yixian
    ADVANCES IN MACHINE LEARNING AND CYBERNETICS, 2006, 3930 : 642 - 651
  • [36] A novel subspace outlier detection method by entropy-based clustering algorithm
    Zuo, Zheng
    Li, Ziqiang
    Cheng, Pengsen
    Zhao, Jian
    SCIENTIFIC REPORTS, 2023, 13 (01)
  • [37] A novel subspace outlier detection method by entropy-based clustering algorithm
    Zheng Zuo
    Ziqiang Li
    Pengsen Cheng
    Jian Zhao
    Scientific Reports, 13
  • [38] Coverage hole detection method of wireless sensor network based on clustering algorithm
    Wang, Feifei
    Hu, Haifeng
    MEASUREMENT, 2021, 179
  • [39] The Research on Fuzzy clustering method based on Differential Evolution algorithm in intrusion detection
    Yang, Qifan
    Wang, Lina
    MATERIAL SCIENCE, CIVIL ENGINEERING AND ARCHITECTURE SCIENCE, MECHANICAL ENGINEERING AND MANUFACTURING TECHNOLOGY II, 2014, 651-653 : 547 - +
  • [40] Information clustering algorithm based on information coefficient measure (ICM)
    Ding, SF
    Shi, ZZ
    Jin, FX
    Li, SS
    ICEMI 2005: CONFERENCE PROCEEDINGS OF THE SEVENTH INTERNATIONAL CONFERENCE ON ELECTRONIC MEASUREMENT & INSTRUMENTS, VOL 3, 2005, : 529 - 535