Optimized Hypergraph Clustering-based Network Security Log Mining

被引:1
|
作者
Che, Jianhua [1 ]
Lin, Weimin [1 ]
Yu, Yong [1 ]
Yao, Wei [2 ]
机构
[1] State Grid Elect Power Res Inst, Informat & Network Secur Lab, Nanjing 210003, Jiangsu, Peoples R China
[2] Agr Univ Hebei, Coll Informat Sci & Technol, Baoding 071001, Hebei, Peoples R China
关键词
Hypergraph clustering; Association rule; Log mining; Network security;
D O I
10.1016/j.phpro.2012.02.113
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
With network's growth and popularization, network security experts are facing bigger and bigger network security log. Network security log is a kind of valuable and important information recording various network behaviors, and has the features of large-scale and high dimension. Therefore, how to analyze these network security log to enhance the security of network becomes the focus of many researchers. In this paper, we first design a frequent attack sequence-based hypergraph clustering algorithm to mine the network security log, and then improve this algorithm with a synthetic measure of hyperedge weight and two optimization functions of clustering result. The experimental results show that the synthetic measure and optimization functions can promote significantly the coverage and precision of clustering result. The optimized hypergraph clustering algorithm provides a data analyzing method for intrusion detecting and active forewarning of network. (C) 2011 Published by Elsevier B.V. Selection and/or peer-review under responsibility of ICAPIE Organization Committee.
引用
收藏
页码:762 / 768
页数:7
相关论文
共 50 条
  • [21] Clustering-Based Network Intrusion Detection System
    Fan, Chun-I
    Lai, Yen-Lin
    Shie, Cheng-Han
    2022 5TH IEEE CONFERENCE ON DEPENDABLE AND SECURE COMPUTING (IEEE DSC 2022), 2022,
  • [22] Energy Demand Prediction with Optimized Clustering-Based Federated Learning
    Perry, Dylan
    Wang, Ning
    Ho, Shen-Shyang
    2021 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2021,
  • [23] Clustering-based heterogeneous optimized-HEED protocols for WSNs
    Prateek Gupta
    Ajay K. Sharma
    Soft Computing, 2020, 24 : 1737 - 1761
  • [24] Clustering-based heterogeneous optimized-HEED protocols for WSNs
    Gupta, Prateek
    Sharma, Ajay K.
    SOFT COMPUTING, 2020, 24 (03) : 1737 - 1761
  • [25] A Wireless Sensor Network Clustering Algorithm based on Hypergraph
    Xu Qian
    Hu Ji-cheng
    Lin Hai
    Kong Ruo-shan
    Luo Yong-en
    Zhu Li
    Mao Hua-qing
    INTERNATIONAL JOURNAL OF FUTURE GENERATION COMMUNICATION AND NETWORKING, 2016, 9 (06): : 297 - 312
  • [26] Comparison Clustering Performance Based on Moodle Log Mining
    Pradana, C.
    Kusumawardani, S. S.
    Permanasari, A. E.
    3RD INTERNATIONAL CONFERENCE ON ENGINEERING TECHNOLOGY FOR SUSTAINABLE DEVELOPMENT (ICET4SD), 2020, 722
  • [27] Clustering-based multidimensional sequential pattern mining of semantic trajectories
    Sakouhi, Thouraya
    Akaichi, Jalel
    INTERNATIONAL JOURNAL OF DATA MINING MODELLING AND MANAGEMENT, 2024, 16 (02) : 148 - 175
  • [28] An Effective Clustering-based Approach for Conceptual Association Rules Mining
    Quan, Tho T.
    Ngo, Linh N.
    Hui, Siu Cheung
    2009 IEEE-RIVF INTERNATIONAL CONFERENCE ON COMPUTING AND COMMUNICATION TECHNOLOGIES: RESEARCH, INNOVATION AND VISION FOR THE FUTURE, 2009, : 257 - +
  • [29] Attack Pattern Mining Algorithm Based on Security Log
    Li, Keyi
    Li, Yang
    Liu, Jianyi
    Zhang, Ru
    Duan, Xi
    2017 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS (ISI), 2017, : 205 - 205
  • [30] ACLNet: an attention and clustering-based cloud segmentation network
    Makwana, Dhruv
    Nag, Subhrajit
    Susladkar, Onkar
    Deshmukh, Gayatri
    Teja, Sai Chandra R.
    Mittal, Sparsh
    Mohan, C. Krishna
    REMOTE SENSING LETTERS, 2022, 13 (09) : 865 - 875