期刊文献+

Application of Self-Organizing Feature Map Neural Network Based on K-means Clustering in Network Intrusion Detection 被引量:4

下载PDF
导出
摘要 Due to the widespread use of the Internet,customer information is vulnerable to computer systems attack,which brings urgent need for the intrusion detection technology.Recently,network intrusion detection has been one of the most important technologies in network security detection.The accuracy of network intrusion detection has reached higher accuracy so far.However,these methods have very low efficiency in network intrusion detection,even the most popular SOM neural network method.In this paper,an efficient and fast network intrusion detection method was proposed.Firstly,the fundamental of the two different methods are introduced respectively.Then,the selforganizing feature map neural network based on K-means clustering(KSOM)algorithms was presented to improve the efficiency of network intrusion detection.Finally,the NSLKDD is used as network intrusion data set to demonstrate that the KSOM method can significantly reduce the number of clustering iteration than SOM method without substantially affecting the clustering results and the accuracy is much higher than Kmeans method.The Experimental results show that our method can relatively improve the accuracy of network intrusion and significantly reduce the number of clustering iteration.
出处 《Computers, Materials & Continua》 SCIE EI 2019年第7期275-288,共14页 计算机、材料和连续体(英文)
  • 相关文献

参考文献5

二级参考文献36

  • 1吴郢.结构自适应自组织神经网络的研究与应用.清华大学自动化硕士论文[M].,1997..
  • 2张学工译.统计学习理论的本质[M].北京:清华大学出版社,1995..
  • 3Bace R G.Intrusion detection[M].[S.l.]:Macmillan Technical Publishing, 2000.
  • 4Lee Wen-ke,Stolfo S J,Mok K W.A data mining framework for building intrusion detection models[C]//The 1999 IEEE Symposium on Security and Privacy,Oakland,CA,1999.
  • 5Mukkamala S,Janoski G,Sung A.Intrusion detection using neural networks and support vector machines,neural networks[C]//Proceedings of the 2002 International Joint Conference, IJCNN'02,2002 : 1702-1707.
  • 6Ramadas M,Ostennann S,Tjaden B.Detecting anomalous network traffic with self-organizing maps[C]//Proc of 6th International Symposium on RAID'03,2003 : 36-54.
  • 7Gao Jian-hong,Xu Li-xin,Dai Ya-ping.An intrusion detection system model based on self-organizing map[C]//Proceedings of the 5th World Congress on intelligent Control and Automation, 2004, Hangzhou, China.
  • 8Kohonen T.Self-organizing maps[M].[S.l.]:Springer Verlag, 1995.
  • 9KDD Cup 1999 Data[EB/OL].(1999-10-28).http://kdd.ics.uci.edu/ databases/kddcup99/kddcup99.html.
  • 10SOM toolbox for Matlab [EB/OL]. (2008).http://www.cis.hut.fi/proj ects/somtoolbox.

共引文献395

同被引文献20

引证文献4

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部