期刊文献+

一种改进的K—means算法在入侵检测中的应用 被引量:3

Application of an Improved K-means Algorithm in Intrusion Detection
在线阅读 下载PDF
导出
摘要 传统的聚类算法存在很多缺点,因此需要做进一步的研究。通过对传统的K-means算法和加权熵措施的K—means算法的研究,提出了一种改进的加权熵措施的K—means算法,且该算法采用了一种新的计算对象间距离的方法,不仅能使在同一个簇中任意对象之间的距离尽可能的小,更能使得不同簇中的任意对象之间的距离尽可能的大。通过在KDD Cup99数据集上实验仿真,表明该算法具有较强的实用性和自适应功能。 Traditional clustering algorithm has a lot of shortcomings ,therefore need to do further study.Through studying the traditional K-means algorithm and the K-means algorithm of entropy-weighted measure, an improved K-means algorithm of entropy-weighted measure is proposed, the algorithm uses a new method of calculating the distance of the objects not only make the distance between any objects close as much as possible in the same cluster, but also make the distance between any objects as large as possible in the different clusters. Through the KDD Cup99 data set simulation experiment, showing that the algorithm has a strong applicability and sell-adaptability.
作者 王彦涛 张凤斌 WANG Yan-tao,ZHANG Feng-bin (School of Computer Science and Technology, Harbin University of Science and Technology, Harbin 150080, China)
出处 《电脑知识与技术》 2009年第12期9824-9827,共4页 Computer Knowledge and Technology
基金 国家自然科学基金项目(60671049)
关键词 网络安全 数据挖掘 入侵检测 加权熵 K—means算法 network security data mining intrusion detection entroy-weighed K-means algorithm
  • 相关文献

参考文献1

二级参考文献4

  • 1Han J W Kamber M 范明 孟小峰译.数据挖掘概念与技术[M].北京:机械工业出版杜,2001.147-158.
  • 2Lee W,Stolfo S J,Mok K W.Mining Audit Data to Build Intrusion Detection Models[EB/OL].2001.http://www.yahoo.com.
  • 3胡建斌.入侵检测技术[DB/OL].北京大学网络与信息安全研究室,2004.
  • 4宁玉杰,郭晓淳.基于数据挖掘技术的网络入侵检测系统[J].计算机测量与控制,2002,10(3):189-191. 被引量:12

共引文献22

同被引文献23

  • 1李洋.K-means聚类算法在入侵检测中的应用[J].计算机工程,2007,33(14):154-156. 被引量:23
  • 2Zong S,Khoshgoftaar T,Seliya N. Clustering-based network intrusion detection[J].International Journal of Reliability Auality and Safety Engineering,2005,(06):12-29.
  • 3Eleazar Eskin,Andrew Arnold,Michael Prerau. A geometric framework for unsupervised anomaly detection:Detecting intrusions in unlabeled data[A].Boston,MA:Kluwer Academic Publishers,2002.78-99.
  • 4Srinivas Mukkamala,Andrew H Sung. Feature selec- tion for intrusion detection with neural networks and support vector machines[J].Journal of the Transpor- tation Research Record,2003,(03):33-39.
  • 5杨斌,刘卫国.一种基于聚类的无监督异常检测方法[J].计算机工程与应用,2008,44(1):138-141. 被引量:6
  • 6Kaufman L, Rousseeuw P J. Finding Groups in Data: An Introduction to Cluster Analysis[M]. New York: John Wiley & Sons,1990.
  • 7H. Friguiand, O.Nasraoui. Unsupervised Learning of Prototypes and Attribute Weights[J]. Pattern Recognition, 2004, 37(3):5 67-581.
  • 8Y. Chan, W.K.Ng, J. Z.Huang. An Optimization Algorithm for Clus- tering Using Weighted Dissimilarity Measures [J]. Pattern P,.ecognition, 2004, 37(5): 943-954.
  • 9程玉青,梅登华,陈龙飞.基于数据挖掘的入侵检测系统模型[J].计算机技术与发展,2009,19(12):123-126. 被引量:12
  • 10张军伟,王念滨,黄少滨,蔄世明.二分K均值聚类算法优化及并行化研究[J].计算机工程,2011,37(17):23-25. 被引量:23

引证文献3

二级引证文献11

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部