The Research of Intrusion Detection Based on Mixed Clustering Algorithm

被引:0
|
作者
Liu, Nanyan [1 ]
机构
[1] Xian Univ Sci & Technol, Coll Comp Sci & Technol, Xian 710054, Peoples R China
关键词
Intrusion Detection; Cluster Analysis; Dissimilarity Matrix; Rough Set; Genetic Algorithm;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Nowadays, network security problems are increasing prominent, and how to find intrusion activities quickly and efficiently has become important to the security of system and network resource. we use the feature extraction and feature selection method of rough set and pattern recognition in the feature selection of network intrusion detection and introducing clustering method and genetic algorithm for network intrusion detection. First, we use the feature extraction which based on rough sets theory for the experimental data set. we use a mixed data dissimilarity algorithm and combining it with k-medoids algorithm. Makes the clustering algorithm can deal with a mixed data set which include continuous and discrete data. Last, traditional k-medoids clustering algorithm is difficult to determine the number of existing clustering, sensitive to initial value and easy to fall into local optimal solution. So we present an unsupervised clustering algorithm which combing with genetic algorithm and k-medoids clustering algorithm. All of these methods are efficiently to solve the defects of traditional k-medoids algorithm. And the algorithm can distinguish new attack from already existed attack.
引用
收藏
页码:92 / 100
页数:9
相关论文
共 50 条
  • [31] CID: a novel clustering-based database intrusion detection algorithm
    Keyvanpour, Mohamad Reza
    Barani Shirzad, Mehrnoush
    Mehmandoost, Samaneh
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2021, 12 (02) : 1601 - 1612
  • [32] A novel intrusion detection method based on clonal selection clustering algorithm
    Xian, JQ
    Lang, FH
    Tang, XL
    PROCEEDINGS OF 2005 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-9, 2005, : 3905 - 3910
  • [33] Fuzzy clustering method based on genetic algorithm in intrusion detection study
    Huang, Min-Ming
    Lin, Bo-Gang
    Tongxin Xuebao/Journal on Communications, 2009, 30 (11 A): : 140 - 145
  • [34] The Application of Clustering Algorithm in Intrusion Detection System
    Ge, Lei
    Zhang, CaiQian
    ADVANCES IN FUTURE COMPUTER AND CONTROL SYSTEMS, VOL 1, 2012, 159 : 77 - 82
  • [35] A genetic SOM clustering algorithm for intrusion detection
    Ma, ZY
    ADVANCES IN NEURAL NETWORKS - ISNN 2005, PT 3, PROCEEDINGS, 2005, 3498 : 421 - 427
  • [36] Parallel clustering algorithm in intrusion detection system
    Li, Qinghua
    Su, Shan
    Jisuanji Gongcheng/Computer Engineering, 2005, 31 (05): : 151 - 152
  • [37] CID: a novel clustering-based database intrusion detection algorithm
    Mohamad Reza Keyvanpour
    Mehrnoush Barani Shirzad
    Samaneh Mehmandoost
    Journal of Ambient Intelligence and Humanized Computing, 2021, 12 : 1601 - 1612
  • [38] Data Stream Clustering Algorithm Based on Bucket Density for Intrusion Detection
    Yin, Chunyong
    Xia, Lian
    Wang, Jin
    ADVANCES IN COMPUTER SCIENCE AND UBIQUITOUS COMPUTING, 2018, 474 : 846 - 850
  • [39] Intrusion detection algorithm based on SSC-tree stream clustering
    Cheng, Chun-Ling
    Yu, Zhi-Hu
    Zhang, Deng-Yin
    Xu, Xiao-Long
    Xi Tong Gong Cheng Yu Dian Zi Ji Shu/Systems Engineering and Electronics, 2012, 34 (03): : 625 - 630
  • [40] An adaptive intrusion detection algorithm based on clustering and kernel-method
    Lee, Hansung
    Chung, Yongwha
    Park, Daihee
    ADVANCES IN KNOWLEDGE DISCOVERY AND DATA MINING, PROCEEDINGS, 2006, 3918 : 603 - 610