Fuzzy clustering method based on genetic algorithm in intrusion detection study

被引:0
|
作者
Huang, Min-Ming [1 ]
Lin, Bo-Gang [1 ]
机构
[1] College of Mathematics and Computer Science, Fuzhou University, Fuzhou 350108, China
来源
Tongxin Xuebao/Journal on Communications | 2009年 / 30卷 / 11 A期
关键词
Clustering algorithms - Copying - Genetic algorithms - Fuzzy clustering - Intrusion detection;
D O I
暂无
中图分类号
学科分类号
摘要
Regarding the problem that fuzzy c-means algorithm (FCM) was sensitive to the initial value and converging to the local infinitesimal point easily, applies genetic algorithm to optimization of the FCM algorithm. Firstly, the results of FCM will be sent to the genetic algorithm for optimization, then the new results again used in FCM to obtain the most advantage of the overall situation. The experimental result shows that the algorithm can effectively detect anomaly intrusions behavior of special target and be better than FCM algorithm, and have a strong global optimization and faster convergence speed.
引用
收藏
页码:140 / 145
相关论文
共 50 条
  • [41] Intrusion Detection Based on Genetic Fuzzy Classification System
    Belhor, Mariem
    Jemili, Farah
    [J]. 2016 IEEE/ACS 13TH INTERNATIONAL CONFERENCE OF COMPUTER SYSTEMS AND APPLICATIONS (AICCSA), 2016,
  • [42] Artificial immune inspired fault detection algorithm based on fuzzy clustering and genetic algorithm methods
    Aydin, Ilhan
    Karakose, Mehmet
    Akin, Erhan
    [J]. 2008 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE FOR MEASUREMENT SYSTEMS AND APPLICATIONS, 2008, : 93 - +
  • [43] A New Method for Short Multivariate Fuzzy Time Series Based on Genetic Algorithm and Fuzzy Clustering
    Selim, Kamal S.
    Elanany, Gihan A.
    [J]. ADVANCES IN FUZZY SYSTEMS, 2013, 2013
  • [44] An efficient network intrusion detection method based on information theory and genetic algorithm
    Xia, T
    Qu, G
    Hariri, S
    Yousif, M
    [J]. CONFERENCE PROCEEDINGS OF THE 2005 IEEE INTERNATIONAL PERFORMANCE, COMPUTING AND COMMUNICATIONS CONFERENCE, 2005, : 11 - 17
  • [45] Neuro-Fuzzy and Genetic-Fuzzy Based Approaches in Intrusion Detection: Comparative Study
    Gaied, Imen
    Jemili, Farah
    Korbaa, Ouajdi
    [J]. 2017 25TH INTERNATIONAL CONFERENCE ON SOFTWARE, TELECOMMUNICATIONS AND COMPUTER NETWORKS (SOFTCOM), 2017, : 347 - 352
  • [46] An intrusion detection method based on clustering multidimensional sets
    Zhong, Yong
    Qin, Xiao-Lin
    Lin, Dong-Mei
    [J]. PROCEEDINGS OF 2006 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2006, : 2799 - +
  • [47] An Adaptive Clustering Algorithm for Intrusion Detection
    QIU JuliNormal University of AnshanAnshanChina
    [J]. 现代电子技术, 2007, (02) : 130 - 132
  • [48] An adaptive clustering algorithm for intrusion detection
    Wu, Guowei
    Yao, Lin
    Yao, Kai
    [J]. 2006 IEEE INTERNATIONAL CONFERENCE ON INFORMATION ACQUISITION, VOLS 1 AND 2, CONFERENCE PROCEEDINGS, 2006, : 1443 - 1447
  • [49] A Clustering Algorithm Oriented to Intrusion Detection
    Li Wei
    Yang Zhong-ming
    Chang Ya-ping
    Zhang Bin
    [J]. 2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (CSE) AND IEEE/IFIP INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING (EUC), VOL 1, 2017, : 862 - 865
  • [50] An unsupervised clustering algorithm for intrusion detection
    Guan, Y
    Ghorbani, AA
    Belacel, N
    [J]. ADVANCES IN ARTIFICIAL INTELLIGENCE, PROCEEDINGS, 2003, 2671 : 616 - 617