期刊文献+

基于半监督聚类的网络入侵检测算法 被引量:2

A Semi-supervised Clustering Algorithm for Network Intrusion Detection
在线阅读 下载PDF
导出
摘要 入侵检测是维护网络安全的重要技术手段之一。本文提出一种聚类算法:k-cubes,用于网络异常检测。算法采用基于网格的方法对网络连接数据进行预处理,然后以网格为数据处理单位进行聚类,在聚类过程中通过动态合并与分裂自动决定聚类的数目。在此基础上给出了半监督k-cubes聚类算法,并根据聚类的结果生成检测规则。k-cubes聚类算法适合处理高维并且含有多值字符属性的大数据量数据,同时具有输入参数少等特点。在KDD99入侵检测数据集上的实验结果显示,算法获得95.82%的检测率和1.25%的误报率,并且在识别新入侵的能力上,算法检测到17种新入侵中的15种。 Intrusion detection is one of the most important techniques in the domain of network security. This paper proposes a novel clustering algorithm, named k-cubes, for network anomaly detection. The network con- nection data are preprocessed with a grid-based algorithm. Then the grid cells are clustered with the proposed method. The number of clusters is automatically decided by dynamically merging and splitting of clusters. Also the semi-supervised version of k-cubes is presented. Detection rules are produced according to the clustering result. This method is suitable for processing large amount of high dimensional datasets with a lot of symbolic attribute values. It also limits the number of inputting parameters. Experimental results on the KDD99 intrusion detection datasets show that our algorithm achieves a detection rate of 95. 82% with a false positive rate of 1.25%, and it detects 15 out of 17 new type of intrusions.
出处 《铁道学报》 EI CAS CSCD 北大核心 2010年第1期49-53,共5页 Journal of the China Railway Society
基金 北京市教育委员会共建项目(353011535)
关键词 网络异常检测 半监督聚类 基于网格的聚类 network anomaly detection semi-supervised clustering grid-based clustering
  • 相关文献

参考文献12

  • 1Lee W, Stolfo S J, Mok K W, et al. Adaptive Intrusion Detection: A Data Mining Approach[J].Artificial Intelligence Review, 2000, 14(6): 533-567.
  • 2Brugger S T. Data Mining Methods for Network Intrusion Deteetion[R]. UC davis: Technique Report, 2004.
  • 3Portnoy L. Intrusion detection with unlabeled data using clustering[D]. New York: Columbia University, Department of Computer Science, 2000.
  • 4Wang W, Yang J, Muntz R. STING: A statistical information grid approach to Spatial Data Mining[C]// Matthias J. Proceedings of 23rd International Conference on Very Large Data Bases. Greece: Morgan Kaufmann, 1997:186 --195.
  • 5Guan Y, Ghorbani A, Belacel N. Y means: A Clustering Method for Intrusion Detection[C]//Guy 0. Proceedings of Canadian Conference on Electrical and Computer Engineering. Montreal: IEEE Press, 2003: 1--4.
  • 6Guha S, Rastogi R, Shim K. ROCK: A Robust Clustering Algorithm for Categorical Attributes [J].Information Systems, 2000, 25(5): 345-366.
  • 7Zhexue H. Extensions to the k--means algorithm for clustering large data sets with categorical values[J]. Data Mining and Knowledge Discovery, 1998,2 : 283 -- 304.
  • 8ACM Special Interest Group on Knowledge Discovery and Data Mining. KDD Cup 1999 Data [DB/OL]. http:// www. sigkdd, org/kddcup, 1999.
  • 9刘衍珩,田大新,余雪岗,王健.基于分布式学习的大规模网络入侵检测算法[J].软件学报,2008,19(4):993-1003. 被引量:46
  • 10Wang Q, Megalooikonomu V. A clustering algorithm for intrusion detection [C]//Betur D. Proceedings of Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2005. Bellingham: SHE, 2005; 31--38.

二级参考文献6

共引文献87

同被引文献32

  • 1吴庆涛,邵志清.入侵检测研究综述[J].计算机应用研究,2005,22(12):11-14. 被引量:19
  • 2韩家炜,堪博 M.数据挖掘:概念与技术[M].范明,孟小峰.译.2版.北京:机械工业出版社,2007:30-65.
  • 3王玲,薄列峰,焦李成.密度敏感的半监督谱聚类[J].软件学报,2007,18(10):2412-2422. 被引量:96
  • 4GUPTA R, GOSAIN A. Validating data warehouse quality metrics using PCA [C]// Proceedings of the Second International Conference on Data Engineering and Management. Tiruchirappalli: Springer-Verlag Press, 2012 : 170-172.
  • 5LIU G S, YI Z, YANG S M. A hierarchical intrusion detection model based on the PCA neural networks [ J]. Neurocomputing, 2007 (70) : 1561-1568.
  • 6MICHEL V, GRAMFORT A, VAROQUAUX G. A supervised clustering approach for fMRI-based inference of brain states [J]. Pattern Recognition, 2012, 45 ( 6 ) : 2041-2049.
  • 7PACHGHARE V K, KHATAVKAR V K, KULKARNI P. Performance analysis of semi-supervised intrusion detection system [J]. International Journal of Computer Applications, 2011, NSC(4) :15-19.
  • 8LI Y Z, LI Z J, WANG R S. Intrusion detection algorithm based on semi-supervised learning [C]// Proceedings of Intemational Conference of Information Technology, Computer Engineering and Management Sciences. Nanjing: IEEE Press, 2011 : 153-156.
  • 9University of California, Irvine. KDD cup 1999 data [EB/OL]. ( 1999-10-28 ) [2012-03-20]. http://kdd.ics. uci. edu/databases/kddcup99/kddcup99. html.
  • 10University of California, Irvine. UCI machine learning repository [EB/OL]. ( 2012-06-09 ) [2012-03-20]. http ://archive. ics. uci. edu/ml/index. html.

引证文献2

二级引证文献13

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部