期刊文献+

聚类分析在入侵检测系统中的改进 被引量:1

A Improved Intrusion Detection about Clustering Analysis
在线阅读 下载PDF
导出
摘要 本文针对传统的聚类算法在入侵检测系统中的不足,提出一种基于密度的初始聚类中心的选择方法,可克服普通K-Means中的需人工确定K值的问题,用此算法改进的入侵检测模型能够获得很好的聚类效果。对比实验结果,发现使用改进后的算法与传统的K-Means相比可以获得更高的检测率和较低的误报率。 This essay focus on the shortcoming of clustering algorithm on the intrusion detection system,put forward a original clustering center selection based on destiny which can solve the problem of K-Means algorithm need manual set K value. On the basic of this algorithm, The intrusion detection module can make a good effect. After the compared experiments show that the advanced clustering algorithm can improve the efficiency of data clustering.
出处 《科技广场》 2011年第7期95-98,共4页 Science Mosaic
关键词 数据挖掘 入侵检测 K-MEANS算法 聚类分析 Data Mining Intrusion Detection K-Means Algorithm Clustering Analysis
  • 相关文献

参考文献7

二级参考文献18

  • 1张千里.CCERT的建议和入侵检测系统的研究[M].北京:清华大学,2000..
  • 2Han Jiawei Kamber M.数据挖掘-概念与技术[M].高等教育出版社,2002..
  • 3[1]Wenke L, Salvatore S . Data Mining Approaches for lnrusion Detection. URL: http://www.cs.columbiaedu/~wenke/papers/usenix/ usenix.html, 2000-10-12
  • 4[2]Network Flight Recorder Inc.Network Flight Recorder http://www.nfr com
  • 5[3]Fayyad U , Piatetsky-Shapiro G , Smyth P . From Data Mining to Knowledge Discovery: An Overview. In Fayyad U . PiatetskyShapiro G , Smyth P, and Uthurusamy R, Editors, Adyances in Knowledge Discovery and Data Mining , AAAI/MIT Press,Cambridge, MA, 1996
  • 6[4]Lunt T. Detecting Intruders in Computer Systems. Proceedings of the 1993 Conference on Auditing and Computer Technology, 1993
  • 7HanJiawei KamberM.数据挖掘—概念与技术[M].高等教育出版社,2002..
  • 8Portnoy L, Eskin E,Stolfo S J.Intrusion Detection with Unlabeled Data Using Clustering. Philadelphia, PA:ln Proceedings of ACM CSS Workshop on Data Mining Applied to Security(DMSA,2001 ),2001.
  • 9Eskin E,Amold A,Prerau M A Geometric Framework for Unsupervied Anomaly Detection: Detecting Intrusions in Unlabeled Dala.CUCS Technical Report,2002.
  • 10Application of Data Mining to Intrusion Detection.http://www.isse.gmu.ed u/-csis/infs765/handouts/handout 12.pdf,2000.

共引文献155

同被引文献16

  • 1卿斯汉,蒋建春,马恒太,文伟平,刘雪飞.入侵检测技术研究综述[J].通信学报,2004,25(7):19-29. 被引量:237
  • 2吴新玲.数据维数消减方法研究[J].计算机工程与设计,2006,27(16):3000-3002. 被引量:2
  • 3陆林花,王波.一种改进的遗传聚类算法[J].计算机工程与应用,2007,43(21):170-172. 被引量:26
  • 4王洁松 张小飞.KDDCup99网络入侵检测数据的分析和预处理.科技信息,2008,(15):407-408.
  • 5Heady R, Luger G, Maccadwe A, et al.The architecture of a network level intrusion detection system[R].Mexico: Computer Science Department,University of New Mexico, 1990.
  • 6Bradley E, Fayyad U.Refming initial points for K-means clustering[C]//Proceedings of 15th International Conference on Machine Learning.San Francisco:Morgan Kaufmann, 1988:91-99.
  • 7Alsabti K, Ranka S, Singh V.An efficient k-means clus- tering algorithm[C]//IPPS/SPDP Workshop on High Per- formance Data Mining,Orlando,Florida, 1998.
  • 8Portnoy L, Eskin E, Stolto S J.Intrusion detection with unlabeled data using clustering[C]//Proceedings of the ACM CSS Workshop on Data Mining Applied to Security. Philadelphia, PA, USA : ACM, 2001 : 56-60.
  • 9KamberM.数据挖掘:概念与技术[M].韩家炜,译.北京:机械工业出版社,2012:338.465.
  • 10程玉青,梅登华,陈龙飞.基于数据挖掘的入侵检测系统模型[J].计算机技术与发展,2009,19(12):123-126. 被引量:12

引证文献1

二级引证文献13

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部