期刊文献+

改进FCM聚类算法及其在入侵检测中的应用 被引量:15

Improved fuzzy C-means clustering algorithm and its application to intrusion detection
在线阅读 下载PDF
导出
摘要 针对模糊C-均值(FCM)算法的局限性,提出了一种具有两阶段的模糊FCM聚类改进算法。通过加入点密度函数加权系数和样本特征矢量权重对FCM聚类算法中的目标函数进行改造,进而给出迭代推导公式和算法描述。该算法克服了样本分布不均匀和样本特征矢量对分类贡献不均衡的情况,有效地提高了聚类精度。最后利用KDD CUP 99数据集进行实验,结果表明该算法具有良好的可靠性和可行性。 Concerning the limits of the Fuzzy C-Means (FCM) clustering algorithm, a new kind of improved algorithm with two stages was put forward. The objective function in FCM clustering algorithm was improved by taking into account the modulus of dot density function and the weight of eigenvector; furthermore, the iterative reasoning formula and the description of algorithm were presented. This algorithm solved the problems of the sample's unequal distribution and the eigenvector of the sample contributing unevenly to the classes, which improved the clustering precision effectively. Experiments on data sets KDD CUP 99 show that the algorithm has good reliability and feasibility.
出处 《计算机应用》 CSCD 北大核心 2009年第5期1336-1338,共3页 journal of Computer Applications
基金 国家自然科学基金资助项目(60773209)
关键词 入侵检测 模糊聚类 C-均值算法 intrusion detection fuzzy clustering C-means algorithm
  • 相关文献

参考文献5

  • 1BEZDEK J C. Pattern recognition with fuzzy objective function algorithms[M]. Norwell, MA, USA: Kluwer Academic Publishers, 1981.
  • 2付辉.模糊C-均值(FCM)聚类算法的改进[J].科学技术与工程,2007,7(13):3121-3123. 被引量:11
  • 3朱卫未,王卫平,梁樑.基于模糊聚类分析的入侵检测方法[J].系统工程与电子技术,2006,28(3):474-477. 被引量:11
  • 4PAL N R, BEZDEK J C. On clustering for the fuzzy c-means model [J]. IEEE Transactions on Fuzzy Systems, 1995, 3(3): 370 - 379.
  • 5KDD CUP 99 [ DB/OL]. [ 2008 - 08 - 12]. http://kdd, ics. uci. edu/databases/kddcup99/kdd-cup99, html.

二级参考文献9

  • 1刘小芳,曾黄麟,吕炳朝.点密度函数加权模糊C-均值算法的聚类分析[J].计算机工程与应用,2004,40(24):64-65. 被引量:30
  • 2[1]Wu K L,Yang M S.A alternative fuzzy c-means clustering algorithm,Pattern Recognition,2002 ;35:2267-2278
  • 3[2]Zhang D Q,Chen S C.A comment on ‘ Alternative c-means clustering algorithms'.Pattern Recognition,2004 ;37:173-174
  • 4Denning D E.An intrusion detection model[J].IEEE Transactions on Software Engineering,SE-13,1987,2:222-232.
  • 5Giorgio Giacinto,Fabio Roli.Intrusion detection in computer networks by multiple classifier systems[J].Pattern Recognition,2002,Proceedings.16th International Conference on,2002,2:390-393.
  • 6Jonatan Gomez,Dipankar Dasgupta.Evolving fuzzy classifiers for intrusion detection[C] //Proc.of the 2002 IEEE,Workshop on Information Assurance,United States Military Academy,West Point,2002.
  • 7Stephanie Forrest,Longstaff Thomas A,Homfery Steven A,et al.A sense of self for unix processes[C] //Proc.of the 1996IEEE Symposinm on,of Security and Privacy,1996:6-8.
  • 8Kosoresow Andrew P,Hofmery Steven A.Intrusion detection via system call traces[J].IEEE Software,1997,14 (5):35-41.
  • 9Bezdek James C.Pattern recognition with fuzzy objective function algorithms[D].PLENUM Press,1981.

共引文献20

同被引文献122

引证文献15

二级引证文献51

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部