Nothing Special   »   [go: up one dir, main page]

Skip to main content

Research of Intrusion Detection Based on Clustering Analysis

  • Conference paper
  • First Online:
Proceedings of the 2012 International Conference on Cybernetics and Informatics

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 163))

Abstract

On the basis of the research of existing intrusion detection technology, the paper establishes an intrusion detection model based on clustering analysis. It perfects the shortcomings existing in traditional one. Meanwhile, in order to improve the shortages of traditional clustering analysis algorithm k-means that it needs to know the number of clustering at the beginning and it is sensitive to initial clustering center, improved k-means algorithm is put forward. It chooses authority data set KDD Cup1999 in the intrusion detection field as experimental data to verify its performance. The experiments show that this algorithm has higher detection rate and lower false positive rate

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 429.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 549.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Zhou Ge, Fan Qin (2011) Network intrusion detection system based on data mining. China Comput Commun 4:148–149

    Google Scholar 

  2. Verwoerd T, Hunt R (2002) Intrusion detection techniques and approaches. Comput Commun 25(15):1356–1365

    Article  Google Scholar 

  3. Wenke L (1999) A data mining for constructing feature and model for intrusion detection system. C Univ 26:46–54

    Google Scholar 

  4. Chinrungrueng C, Sequin CH (2002) Optimal adaptive k-means algorithm with dynamic adjustment of learning rate. C Univ 411:7–9

    Google Scholar 

  5. Yan Xiaoguang, Chu Xuezheng (2005) Application to cluster algorithm in anomaly detection of network intrusion. J Appl Comput Syst 10:34–37

    Google Scholar 

  6. Zhang Xinyou, Zeng Huashen, Jia Lei (2010) Intrusion detection data set KDD CUP99. Comput Eng Des 22:4809–4816

    Google Scholar 

Download references

Acknowledgement

Our thanks go to Tangshan Science and Technology Bureau (grant number: 11150201A-19), and Hebei United University (grant number: z200716), which grant us enough fund to support our research. Also, we extend our sincere gratitude to editors, the anonymous reviewers and the sponsor.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mingjun Wei .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer Science+Business Media New York

About this paper

Cite this paper

Wei, M., Xia, L., Jin, J., Chen, C. (2014). Research of Intrusion Detection Based on Clustering Analysis. In: Zhong, S. (eds) Proceedings of the 2012 International Conference on Cybernetics and Informatics. Lecture Notes in Electrical Engineering, vol 163. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-3872-4_252

Download citation

  • DOI: https://doi.org/10.1007/978-1-4614-3872-4_252

  • Published:

  • Publisher Name: Springer, New York, NY

  • Print ISBN: 978-1-4614-3871-7

  • Online ISBN: 978-1-4614-3872-4

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics