Relative network entropy based clustering algorithm for intrusion detection

被引:0
|
作者
Qian, Quan [1 ]
Wang, Tianhong [1 ]
Zhan, Rui [1 ]
机构
[1] School of Computer Engineering and Science, Shanghai University, State Key Laboratory of Information Security, Shanghai, China
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:16 / 22
相关论文
共 50 条
  • [31] A Graph-based Clustering Algorithm for Anomaly Intrusion Detection
    Zhou Mingqiang
    Huang Hui
    Wang Qian
    PROCEEDINGS OF 2012 7TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE & EDUCATION, VOLS I-VI, 2012, : 1311 - 1314
  • [32] Intrusion Detection based on ant colony algorithm of Fuzzy clustering
    Li, Wei Song
    Duan, Long Zhen
    Bai, Xiao Ming
    Zhang, Xu
    2011 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT), VOLS 1-4, 2012, : 1642 - 1645
  • [33] Network intrusion detection algorithm based on deep neural network
    Jia, Yang
    Wang, Meng
    Wang, Yagang
    IET INFORMATION SECURITY, 2019, 13 (01) : 48 - 53
  • [34] Adaptive clustering for network intrusion detection
    Oldmeadow, J
    Ravinutala, S
    Leckie, C
    ADVANCES IN KNOWLEDGE DISCOVERY AND DATA MINING, PROCEEDINGS, 2004, 3056 : 255 - 259
  • [35] Network traffic clustering for intrusion detection
    Arina, Nikishova
    Irina, Ananina
    Evgeny, Ananin
    PROCEEDINGS OF THE IV INTERNATIONAL RESEARCH CONFERENCE INFORMATION TECHNOLOGIES IN SCIENCE, MANAGEMENT, SOCIAL SPHERE AND MEDICINE (ITSMSSM 2017), 2017, 72 : 252 - 256
  • [36] Intrusion Detection based on ART and Artificial Immune Network Clustering
    Liu, F
    Bai, L
    Jiao, LC
    ADVANCES IN NATURAL COMPUTATION, PT 2, PROCEEDINGS, 2005, 3611 : 780 - 783
  • [37] Intrusion detection in network flows based on an optimized clustering criterion
    Karimpour, Jaber
    Lotfi, Shahriar
    Tajari Siahmarzkooh, Aliakbar
    TURKISH JOURNAL OF ELECTRICAL ENGINEERING AND COMPUTER SCIENCES, 2017, 25 (03) : 1963 - 1975
  • [38] Entropy based intrusion detection
    Yoshida, K
    2003 IEEE PACIFIC RIM CONFERENCE ON COMMUNICATIONS, COMPUTERS, AND SIGNAL PROCESSING, VOLS 1 AND 2, CONFERENCE PROCEEDINGS, 2003, : 840 - 843
  • [39] A Network Intrusion Detection Algorithm Based on Outlier Mining
    Ding, Tianyi
    Zhang, Min
    He, Dongjie
    COMMUNICATIONS, SIGNAL PROCESSING, AND SYSTEMS, 2019, 463 : 1229 - 1236
  • [40] Quantum Evolutionary Algorithm Based Network Intrusion Detection
    Yin, Xiangdong
    ICCSIT 2010 - 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, VOL 4, 2010, : 683 - 685