The Research of Intrusion Detection Based on Mixed Clustering Algorithm

被引:0
|
作者
Liu, Nanyan [1 ]
机构
[1] Xian Univ Sci & Technol, Coll Comp Sci & Technol, Xian 710054, Peoples R China
关键词
Intrusion Detection; Cluster Analysis; Dissimilarity Matrix; Rough Set; Genetic Algorithm;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Nowadays, network security problems are increasing prominent, and how to find intrusion activities quickly and efficiently has become important to the security of system and network resource. we use the feature extraction and feature selection method of rough set and pattern recognition in the feature selection of network intrusion detection and introducing clustering method and genetic algorithm for network intrusion detection. First, we use the feature extraction which based on rough sets theory for the experimental data set. we use a mixed data dissimilarity algorithm and combining it with k-medoids algorithm. Makes the clustering algorithm can deal with a mixed data set which include continuous and discrete data. Last, traditional k-medoids clustering algorithm is difficult to determine the number of existing clustering, sensitive to initial value and easy to fall into local optimal solution. So we present an unsupervised clustering algorithm which combing with genetic algorithm and k-medoids clustering algorithm. All of these methods are efficiently to solve the defects of traditional k-medoids algorithm. And the algorithm can distinguish new attack from already existed attack.
引用
收藏
页码:92 / 100
页数:9
相关论文
共 50 条
  • [1] Intrusion detection based on clustering genetic algorithm
    Zhao, JL
    Zhao, JF
    Li, JJ
    Proceedings of 2005 International Conference on Machine Learning and Cybernetics, Vols 1-9, 2005, : 3911 - 3914
  • [2] A Clustering based Algorithm for Network Intrusion Detection
    Arya, K. V.
    Kumar, Hemant
    PROCEEDINGS OF THE FIFTH INTERNATIONAL CONFERENCE ON SECURITY OF INFORMATION AND NETWORKS, 2012, : 193 - 196
  • [3] Research of Immune Intrusion Detection Algorithm Based on Semi-supervised Clustering
    Wang, Xiaowei
    ARTIFICIAL INTELLIGENCE AND COMPUTATIONAL INTELLIGENCE, PT II, 2011, 7003 : 69 - 74
  • [4] The Research on Fuzzy clustering method based on Differential Evolution algorithm in intrusion detection
    Yang, Qifan
    Wang, Lina
    MATERIAL SCIENCE, CIVIL ENGINEERING AND ARCHITECTURE SCIENCE, MECHANICAL ENGINEERING AND MANUFACTURING TECHNOLOGY II, 2014, 651-653 : 547 - +
  • [5] An Intrusion Detection Research Based on Spectral Clustering
    Luo Min
    Li Xiaohong
    Xie Shouhe
    2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 4599 - +
  • [6] A clustering algorithm for intrusion detection
    Wang, Q
    Megalooikonomou, V
    DATA MINING, INTRUSION DETECTION, INFORMATION ASSURANCE, AND DATA NETWORKS SECURITY 2005, 2005, 5812 : 31 - 38
  • [7] Clustering Algorithm Based on Outlier Detection for Anomaly Intrusion Detection
    Yin, Shang-Nan
    Kang, Ho-Seok
    Kim, Sung-Ryul
    JOURNAL OF INTERNET TECHNOLOGY, 2016, 17 (02): : 291 - 299
  • [8] Advanced Clustering Based Intrusion Detection (ACID) Algorithm
    Borah, Samarjeet
    Chakravorty, Debaditya
    Chawhan, Chandan
    Saha, Aritra
    ADVANCES IN COMPUTING AND COMMUNICATIONS, PT III, 2011, 192 : 35 - 43
  • [9] Application of Clustering Algorithm in Intrusion Detection Based on PCA
    Li, Han
    2015 International Conference on Software Engineering and Information System (SEIS 2015), 2015, : 239 - 244
  • [10] Research on Alarm Reduction of Intrusion Detection System Based on Clustering and Whale Optimization Algorithm
    Wang, Leiting
    Gu, Lize
    Tang, Yifan
    APPLIED SCIENCES-BASEL, 2021, 11 (23):