The Research of Intrusion Detection Based on Mixed Clustering Algorithm

被引:0
|
作者
Liu, Nanyan [1 ]
机构
[1] Xian Univ Sci & Technol, Coll Comp Sci & Technol, Xian 710054, Peoples R China
关键词
Intrusion Detection; Cluster Analysis; Dissimilarity Matrix; Rough Set; Genetic Algorithm;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Nowadays, network security problems are increasing prominent, and how to find intrusion activities quickly and efficiently has become important to the security of system and network resource. we use the feature extraction and feature selection method of rough set and pattern recognition in the feature selection of network intrusion detection and introducing clustering method and genetic algorithm for network intrusion detection. First, we use the feature extraction which based on rough sets theory for the experimental data set. we use a mixed data dissimilarity algorithm and combining it with k-medoids algorithm. Makes the clustering algorithm can deal with a mixed data set which include continuous and discrete data. Last, traditional k-medoids clustering algorithm is difficult to determine the number of existing clustering, sensitive to initial value and easy to fall into local optimal solution. So we present an unsupervised clustering algorithm which combing with genetic algorithm and k-medoids clustering algorithm. All of these methods are efficiently to solve the defects of traditional k-medoids algorithm. And the algorithm can distinguish new attack from already existed attack.
引用
收藏
页码:92 / 100
页数:9
相关论文
共 50 条
  • [21] The Research of Intrusion Detection Algorithms Based on the Clustering of Information Entropy
    Ye Zheng-wang
    2011 INTERNATIONAL CONFERENCE OF ENVIRONMENTAL SCIENCE AND ENGINEERING, VOL 12, PT B, 2012, 12 : 1329 - 1334
  • [23] Research of Intrusion Detection Method Based on Ant Colony Clustering
    Yue Qiang
    Hu Zhongyu
    Shen Shikai
    Zhang Dawei
    PROCEEDINGS OF THE 2016 4TH INTERNATIONAL CONFERENCE ON MACHINERY, MATERIALS AND COMPUTING TECHNOLOGY, 2016, 60 : 6 - 11
  • [24] Research on Intrusion Detection Technology Based on Immune Algorithm
    Zhu, Kai
    Meng, Xiangru
    Ma, Zhiqiang
    KAM: 2008 INTERNATIONAL SYMPOSIUM ON KNOWLEDGE ACQUISITION AND MODELING, PROCEEDINGS, 2008, : 759 - 762
  • [25] Intrusion Detection Technology Research Based on Apriori Algorithm
    Li Hanguang
    Ni Yu
    INTERNATIONAL CONFERENCE ON APPLIED PHYSICS AND INDUSTRIAL ENGINEERING 2012, PT C, 2012, 24 : 1615 - 1620
  • [26] Intrusion detection research based on SVM and intelligence algorithm
    Zhao, Jian-hua
    Li, Wei-hua
    International Journal of Advancements in Computing Technology, 2012, 4 (16) : 445 - 452
  • [27] A supervised clustering algorithm for computer intrusion detection
    Xiangyang Li
    Nong Ye
    Knowledge and Information Systems, 2005, 8 : 498 - 509
  • [28] Application of improved Clustering Algorithm in Intrusion Detection
    Dai Kunyu
    Hu Bin
    2ND INTERNATIONAL SYMPOSIUM ON COMPUTER NETWORK AND MULTIMEDIA TECHNOLOGY (CNMT 2010), VOLS 1 AND 2, 2010, : 621 - 624
  • [29] A neighbor propagation clustering algorithm for intrusion detection
    Li Z.
    Li, Zheng (lizh_1981@163.com), 1600, International Information and Engineering Technology Association (34): : 331 - 336
  • [30] A supervised clustering algorithm for computer intrusion detection
    Li, XY
    Ye, N
    KNOWLEDGE AND INFORMATION SYSTEMS, 2005, 8 (04) : 498 - 509