期刊文献+

优化的聚类算法在异常检测中的应用

Application of Optimized Clustering Algorithm in Anomaly Detection
下载PDF
导出
摘要 分析原有k-means聚类算法在异常检测应用中的不足,并对其进行优化,将优化后的聚类算法应用到异常检测中.实验表明,优化后的算法在入侵检测率和抗干扰能力方面有很大的提高. By analyzing the deficiency of the original k-means algorithm in intrusion detection, the k-means algorithm was optimized. The optimized algorithm was used in anomaly detection. Experiments show that the optimized algorithm can get better cluster result and progress was made in the rate of intrusion detection and anti-interference technique.
作者 李建国
出处 《淮北师范大学学报(自然科学版)》 CAS 2013年第4期52-55,共4页 Journal of Huaibei Normal University:Natural Sciences
基金 淮北市科技局基金项目(20120308)
关键词 异常检测 误用检测 聚类分析 k—means算法 anomaly detection misused detection cluster analysis k-means algorithm
  • 相关文献

参考文献6

二级参考文献33

  • 1余建桥,张帆.基于数据场改进的PAM聚类算法[J].计算机科学,2005,32(1):165-167. 被引量:15
  • 2[1]R.Heady,G.Luger,A.Maccabe,M.Servilla.The archit ecture of a network level intrusion detection syetem.Technical report Computer Science Department University of New Mexico August 1990. 被引量:1
  • 3[2]Stefan Axelsson.Intrusion Detection Systems:A Survey and Taxonomy.http://ww w.mnlab.cs.depaul.edu/seminar/spr2003/IDSSurvey.pdf,14 March 2000. 被引量:1
  • 4[3]Lee W,Salvatore J Stolfo.Adaptive Intrusion Detection:a Data Mining Approach,Artificial Intelligence Review,Kluwer Academic Publishers.2000,14(6):533-567. 被引量:1
  • 5[4]Lee W,Stolfo S J.Data Mining Approaches for Intrusion Detection.Proe.7th USENIX Security Symposium,1998. 被引量:1
  • 6[5]Agrawal,R.Srikant.Fast algorithm for mining association rules.In:Jorge,B.B,Matthias,J.Carlo,Z.eds.Proceedings of the 20th International Confereace.on Very Large Databases.Santiago:Morgan Kaufmann Publishers,Inc,1994.487-499. 被引量:1
  • 7[7]Box G E P.Jenkins G M.Time Series Analysis,Forecasting and Contronl.Holden-Dai(2ed),1976. 被引量:1
  • 8[8]Portnoy L,Eskin E,Stolfo S J.Intrusion Detection with Unlabeled Data Using Clustering.Philadelphia:Proceedings of ACM CSS Workshop on Data Mining Ap-plied to Security(DMSA 2001),ACM Press,2001. 被引量:1
  • 9[9]Lee W,Stolfo S,Mok K.Mining Audit Data to Build Intrusion Detection Models.The Fourth International Conference on Knowledge Discovery and Data Mining (KDD 98),New York,NY,1998. 被引量:1
  • 10[10]Taffler.R.J.The Use of the Z-Score Approach in Practice.Working Paper 95/1,15th June 1995. 被引量:1

共引文献72

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部