期刊文献+

改进k-means算法的网络数据库入侵检测 被引量:2

Improved K-means Algorithm Network Database Intrusion Detection
下载PDF
导出
摘要 提出改进的k-means算法,加入过滤优化功能,通过簇候选集合中攻击簇的数目优化,删除掉非最优聚类数据集合中的攻击数据,生产最优簇,提高后期网络数据库入侵检测的时效性,降低漏检率.实验结果表明,本文的方法能够优化聚类后生成攻击簇的数目的数目,为网络数据量入侵检测提供便利,提高了检测的准确性,降低了漏检率. This paper proposed the improvement k-means algorithm,join filter optimization function through the cluster set the number of candidates clusters,deleted the optimal cluster the data in the data set,the optimal cluster,improve production later network database intrusion detection,reduce the efficiency of the miss rate.The experiment results show that the method can optimize the clustering to create the number of clusters,for the number of network data quantity intrusion detection provides convenience,improve the detection accuracy,and to reduce the miss rate.
作者 韩占柱
出处 《微电子学与计算机》 CSCD 北大核心 2012年第3期144-146,150,共4页 Microelectronics & Computer
关键词 网络数据库 入侵检测 改进算法 network database intrusion detection improved algorithm
  • 相关文献

参考文献6

  • 1Krista Rizman,Zalik.An efficient K-means clusteringalgorithm[J].Pattern RecognitionLetters,2008(29):1385-1391.
  • 2He D,Goker A.Detecting session boundaries fromWeb user logs[C]∥Proceedings of the 22nd AnnualColloquium of IR Research.Cambridge:[s.n.],2005.
  • 3陶剑文.一种分布式Web日志挖掘系统的设计与实现[J].计算机仿真,2006,23(10):109-112. 被引量:26
  • 4Cooley R,Mobasher B,Srivastava J.Grouping webpage references into transactions for mining worldWide web browsing patterns[C]∥proceedings of the1997IEEE knowledye and Data Engineering ExchangeWorkshop.Washinytion,DC,USA:IEEE ComputerSociety,1997.
  • 5Zhang Bofeng,Su Jinshu,Xu Xin.A class-incremen-tal learning method for multiclass support vector ma-chines in text classification[C]∥Proceeding of theFifth International conference on Machine Learningand Cybernetics.Dalian:IEEE,2006.
  • 6He D,Goker A.Detecting session boundaries fromweb user logs[C]∥Proceedings of the 22nd AnnualColloquium of IR Research.Cambridge:[s.n.],2005.

二级参考文献6

  • 1张云勇 刘锦德.移动agent技术[M].北京:清华大学出版社,2003..
  • 2M S Chen, J S Park, P S Yu. Data mining for path traversal patterns in a Web environment [C]. In Proc. The 16th International Conference on Distributed Computing Systems,May, 1996. 385 -392.
  • 3J Han, M Kamber. Data Mining: Concepts and Techniques[ M]. Morgan Kaufmann Publisher, 2000.
  • 4K P Joshi, A. Joshi, Y Yesha and R Krishnapuram.Warehousing and mining web logs. In Proc. Of ACM CIKM Workshop on Web Information and Data Management[C].ACM, 1999. 63 -68.
  • 5M Eirinaki and M Vazirgiannis. Web mining for web personalization[J]. ACM Transactions on Internet Technology(TOIT), 2003, 3 (1): 1 -27.
  • 6R Cooley, B Mobasher and J Srivastava. Data preparation for mining World Wide Web browsing patterns[J]. In Journal of Knowledge & Information Systems, 1999, 1 ( 1 ).

共引文献25

同被引文献24

  • 1THANGAVEL M,Dr THANGARAJ P.Cluster based statisticalanomaly intrusion detection for varied attack intensities[J].Interna-tional Journal of Computer Applications,2011,24(9):27-33.
  • 2SHARADA K A,HEMANT,PRASHANTH,et al.A model proposedfor reducing the false positive alarm rate using the feature of eventcorrelation[J].International Journal of Advanced Research inComputer Science and Software Engineering,2012,2(8):103-108.
  • 3AI-MAMORY S 0,ZHANG Hong-li.Intrusion detection alarm reduc-tion using root cause analysis and clustering[J].Journal Of Comput-er Communication,2009,32(2):419-430.
  • 4GADDAM S R,PHOHA V V,BALAGANI K S.K-means + ID3 ; anovel method for supervised anomaly detection by cascading K-meansclustering and ID3 decision tree learning methods[J].IEEE Transon Knowledge and Data Engineering,2007,19(3):345-354.
  • 5PIETRASZEK T.Using adaptive alert classification to reduce falsepositives in intrusion detection[C]//Lecture Hotes in ComputerScience,vol 3224.2004:102-124.
  • 6VIINIKKA J,DEBAR H.Processing instrusion detection alert aggre-gate with time series moding[J].Information Fusion,2009,10(2):312-324.
  • 7KIM D S,SHINBO H,YOKOTA H.An alarm correlation algorithm fornetwork management based on root cause analysis[J].InternationalJournal of Computer Science and Network Security,2011,9(12):1233-1238.
  • 8YASAMI Y,MOZAFFARI S P.A novel unsupervised classificationapproach for network anomaly detection by K-means clustering andID3 decision tree learning methods[J].Journal Of Supercompu-ting,2010,53(1):231-245.
  • 9HARIRI A,RASTEGAR H,NAVI K,et al.Cellular learning auto-mata based evolutionary computing for intrinsic hardware evolution[C]//Proc of NASA/DoD Conference on Evolvable Hardware.2005:294-297.
  • 10MITCHELL T.Machine learning[M].New York:McGraw-Hill,2004.

引证文献2

二级引证文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部