Optimized Hypergraph Clustering-based Network Security Log Mining

被引:1
|
作者
Che, Jianhua [1 ]
Lin, Weimin [1 ]
Yu, Yong [1 ]
Yao, Wei [2 ]
机构
[1] State Grid Elect Power Res Inst, Informat & Network Secur Lab, Nanjing 210003, Jiangsu, Peoples R China
[2] Agr Univ Hebei, Coll Informat Sci & Technol, Baoding 071001, Hebei, Peoples R China
关键词
Hypergraph clustering; Association rule; Log mining; Network security;
D O I
10.1016/j.phpro.2012.02.113
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
With network's growth and popularization, network security experts are facing bigger and bigger network security log. Network security log is a kind of valuable and important information recording various network behaviors, and has the features of large-scale and high dimension. Therefore, how to analyze these network security log to enhance the security of network becomes the focus of many researchers. In this paper, we first design a frequent attack sequence-based hypergraph clustering algorithm to mine the network security log, and then improve this algorithm with a synthetic measure of hyperedge weight and two optimization functions of clustering result. The experimental results show that the synthetic measure and optimization functions can promote significantly the coverage and precision of clustering result. The optimized hypergraph clustering algorithm provides a data analyzing method for intrusion detecting and active forewarning of network. (C) 2011 Published by Elsevier B.V. Selection and/or peer-review under responsibility of ICAPIE Organization Committee.
引用
收藏
页码:762 / 768
页数:7
相关论文
共 50 条
  • [1] Optimized Hypergraph Clustering-based Network Security Log Mining
    Che, Jianhua
    Yu, Yong
    Lin, Weimin
    Yao, Wei
    2010 INTERNATIONAL CONFERENCE ON COMMUNICATION AND VEHICULAR TECHNOLOGY (ICCVT 2010), VOL II, 2010, : 192 - 195
  • [2] Web log mining based on immune network clustering algorithm
    College of Mathematics and Computer Science, Chongqing Normal University, Chongqing 400047, China
    J. Comput. Inf. Syst., 2007, 4 (1549-1554):
  • [3] A k-means clustering-based security framework for mobile data mining
    Guizani, Sghaier
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2016, 16 (18): : 3449 - 3454
  • [4] Clustering-based gradual pattern mining
    Owuor, Dickson Odhiambo
    Runkler, Thomas
    Laurent, Anne
    Bonyo, Lesley
    INTERNATIONAL JOURNAL OF MACHINE LEARNING AND CYBERNETICS, 2024, 15 (06) : 2263 - 2281
  • [5] Hypergraph Clustering-based Cloud Manufacturing Service Management Method
    Wu, Lei
    He, Minggang
    Han, Yanyan
    PROCEEDINGS OF THE 2014 IEEE 18TH INTERNATIONAL CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK IN DESIGN (CSCWD), 2014, : 220 - 225
  • [6] A Neural-Network Clustering-Based Algorithm for Privacy Preserving Data Mining
    Tsiafoulis, S.
    Zorkadis, V. C.
    Karras, D. A.
    GRID AND DISTRIBUTED COMPUTING, CONTROL AND AUTOMATION, 2010, 121 : 269 - +
  • [7] Research on Web Log Data Mining Technology Based on Optimized Clustering Analysis Algorithm
    Wang, Xin
    Xing, Yujuan
    2021 INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE AND BLOCKCHAIN TECHNOLOGY (AIBT 2021), 2021, : 6 - 11
  • [8] Clustering-based approaches to SAGE data mining
    Wang, Haiying
    Zheng, Huiru
    Azuaje, Francisco
    BIODATA MINING, 2008, 1 (1)
  • [9] A Clustering-Based Approach to the Mining of Analogical Proportions
    Beltran, William Correa
    Jaudoin, Helene
    Pivert, Olivier
    2015 IEEE 27TH INTERNATIONAL CONFERENCE ON TOOLS WITH ARTIFICIAL INTELLIGENCE (ICTAI 2015), 2015, : 125 - 131
  • [10] Clustering-based approaches to SAGE data mining
    Haiying Wang
    Huiru Zheng
    Francisco Azuaje
    BioData Mining, 1