A K-means algorithm based on characteristics of density applied to network intrusion detection

被引:10
|
作者
Xu, Jing [1 ]
Han, Dezhi [2 ]
Li, Kuan-Ching [3 ]
Jiang, Hai [4 ]
机构
[1] Shanghai Maritime Univ, Software Engn, Sch Informat Engn, Shanghai 201306, Peoples R China
[2] Shanghai Maritime Univ, Comp Sci & Engn, Shanghai 201306, Peoples R China
[3] Providence Univ, Taichung 43301, Taiwan
[4] Arkansas State Univ, Dept Comp Sci, Jonesboro, AR 72467 USA
关键词
Network security; K-means; Kd-tree; Network intrusion detection; SEARCH;
D O I
10.2298/CSIS200406014X
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
K-means algorithms are a group of popular unsupervised algorithms widely used for cluster analysis. However, the results of traditional K-means clustering algorithms are greatly affected by the initial clustering center, with unstable accuracy and low speed, which makes the algorithm hard to meet the requirements for Big Data. In this paper, a modernized version of the K-means algorithm based on density to select the initial seed of clustering is proposed. Firstly, Kd-tree is used to divide the hyper-rectangle space, so those points close to each other are grouped into the same sub-tree during data pre-processing, and the generalized information is stored in the tree structure. Besides, an improved Kd-tree nearest neighbor search is used in the K-means algorithm to prune the search space and optimize the operation for speedup. The clustering results show that the clusters are stable and accurate when the numbers of clusters and iterations are constant. Experimental results in the network intrusion detection case show that the improved version of the K-means algorithms performs better in terms of detection rate and false rate.
引用
收藏
页码:665 / 687
页数:23
相关论文
共 50 条
  • [1] A Network Intrusion Detection Model Based on K-means Algorithm and Information Entropy
    Meng, Gao
    Dan, Li
    Ni-Hong, Wang
    Li-Chen, Liu
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2014, 8 (06): : 285 - 294
  • [2] Robust Intrusion Detection Algorithm Based on K-means and BP
    Zhong, Yangjun
    Zhang, Shuiping
    [J]. INTELLIGENT STRUCTURE AND VIBRATION CONTROL, PTS 1 AND 2, 2011, 50-51 : 634 - 638
  • [3] Research on Network Intrusion Detection System Based on Improved K-means Clustering Algorithm
    Li Tian
    Wang Jianwen
    [J]. 2009 INTERNATIONAL FORUM ON COMPUTER SCIENCE-TECHNOLOGY AND APPLICATIONS, VOL 1, PROCEEDINGS, 2009, : 76 - 79
  • [4] The Application on Intrusion Detection Based on K-means Cluster Algorithm
    Meng Jianliang
    Shang Haikun
    Bian Ling
    [J]. 2009 INTERNATIONAL FORUM ON INFORMATION TECHNOLOGY AND APPLICATIONS, VOL 1, PROCEEDINGS, 2009, : 150 - 152
  • [5] Application research of improved K-means algorithm in network intrusion detection
    Zhang, Gongrang
    Hu, Wei
    [J]. EDUCATION AND MANAGEMENT INNOVATION, 2017, : 83 - 94
  • [6] Network Intrusion Detection Using Improved Genetic k-means Algorithm
    Sukumar, Anand J., V
    Pranav, I
    Neetish, M. M.
    Narayanan, Jayasree
    [J]. 2018 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2018, : 2441 - 2446
  • [7] Efficient K-means Algorithm in Intrusion Detection
    Yang, Wenjun
    [J]. PROCEEDINGS OF THE 2017 2ND INTERNATIONAL CONFERENCE ON MODELLING, SIMULATION AND APPLIED MATHEMATICS (MSAM2017), 2017, 132 : 193 - 195
  • [8] Intrusion detection based on MLP neural networks and K-means algorithm
    Zheng, HY
    Ni, L
    Xiao, D
    [J]. ADVANCES IN NEURAL NETWORKS - ISNN 2005, PT 3, PROCEEDINGS, 2005, 3498 : 434 - 438
  • [9] Intrusion Detection in Wireless Sensor Network Using Genetic K-Means Algorithm
    Sandhya, G.
    Julian, Anitha
    [J]. 2014 INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION CONTROL AND COMPUTING TECHNOLOGIES (ICACCCT), 2014, : 1791 - 1794
  • [10] Improved K-means clustering algorithm in intrusion detection
    Xiao, ShiSong
    Li, XiaoXu
    Liu, XueJiao
    [J]. 2008 PROCEEDINGS OF INFORMATION TECHNOLOGY AND ENVIRONMENTAL SYSTEM SCIENCES: ITESS 2008, VOL 2, 2008, : 771 - 775