G-Means: A Clustering Algorithm for Intrusion Detection

Author(s):  
Zhonghua Zhao ◽  
Shanqing Guo ◽  
Qiuliang Xu ◽  
Tao Ban
2013 ◽  
Vol 760-762 ◽  
pp. 2220-2223
Author(s):  
Lang Guo

In view of the defects of K-means algorithm in intrusion detection: the need of preassign cluster number and sensitive initial center and easy to fall into local optimum, this paper puts forward a fuzzy clustering algorithm. The fuzzy rules are utilized to express the invasion features, and standardized matrix is adopted to further process so as to reflect the approximation degree or correlation degree between the invasion indicator data and establish a similarity matrix. The simulation results of KDD CUP1999 data set show that the algorithm has better intrusion detection effect and can effectively detect the network intrusion data.


2018 ◽  
Vol 2018 ◽  
pp. 1-12 ◽  
Author(s):  
Hongchun Qu ◽  
Libiao Lei ◽  
Xiaoming Tang ◽  
Ping Wang

For resource-constrained wireless sensor networks (WSNs), designing a lightweight intrusion detection technology has been a hot and difficult issue. In this paper, we proposed a lightweight intrusion detection method that was able to directly map the network status into sensor monitoring data received by base station, so that base station can sense the abnormal changes in the network. Our method is highlighted by the fusion of fuzzy c-means algorithm, one-class SVM, and sliding window procedure to effectively differentiate network attacks from abnormal data. Finally, the proposed method was tested on the wireless sensor network simulation software EXata and in real applications. The results showed that the intrusion detection method in this paper could effectively identify whether the abnormal data came from a network attack or just a noise. In addition, extra energy consumption can be avoided in all sensor monitoring nodes of the sensor network where our method has been deployed.


2015 ◽  
Vol 713-715 ◽  
pp. 2499-2502
Author(s):  
Jiang Kun Mao ◽  
Fan Zhan

Intrusion detection system as a proactive network security technology, is necessary and reasonable to add a static defense. However, the traditional exceptions and errors detecting exist issues of leakage police, the false alarm rate or maintenance difficult. In this paper, The intrusion detection system based on data mining with statistics, machine learning techniques in the detection performance, robustness, self-adaptability has a great advantage. The system improves the K-means clustering algorithm, focus on solving two questions of the cluster center node selection and discriminating of clustering properties, the test shows that the system further enhance the detection efficiency of the system.


Author(s):  
Wentie Wu ◽  
Shengchao Xu

In view of the fact that the existing intrusion detection system (IDS) based on clustering algorithm cannot adapt to the large-scale growth of system logs, a K-mediods clustering intrusion detection algorithm based on differential evolution suitable for cloud computing environment is proposed. First, the differential evolution algorithm is combined with the K-mediods clustering algorithm in order to use the powerful global search capability of the differential evolution algorithm to improve the convergence efficiency of large-scale data sample clustering. Second, in order to further improve the optimization ability of clustering, a dynamic Gemini population scheme was adopted to improve the differential evolution algorithm, thereby maintaining the diversity of the population while improving the problem of being easily trapped into a local optimum. Finally, in the intrusion detection processing of big data, the optimized clustering algorithm is designed in parallel under the Hadoop Map Reduce framework. Simulation experiments were performed in the open source cloud computing framework Hadoop cluster environment. Experimental results show that the overall detection effect of the proposed algorithm is significantly better than the existing intrusion detection algorithms.


Measurement ◽  
2014 ◽  
Vol 55 ◽  
pp. 212-226 ◽  
Author(s):  
Shahaboddin Shamshirband ◽  
Amineh Amini ◽  
Nor Badrul Anuar ◽  
Miss Laiha Mat Kiah ◽  
Ying Wah Teh ◽  
...  

2014 ◽  
Vol 651-653 ◽  
pp. 547-550
Author(s):  
Qi Fan Yang ◽  
Li Na Wang

Fuzzy C-means clustering algorithm (FCM) is widely applied to the intrusion detection. To acquire a better division for intrusion data, a new method (DEFCM) presented in the paper which combines FCM and differential evolution algorithm (DE) is found application. As a start, several randomly initiated partitions are optimized by FCM, and then the result is provided to differential evolution algorithm. After that, the combined result is sent to FCM again to adjust the partition and obtain the final answer. The method can improve detection performance effectively. The KDDCUP1999 data set is used in the simulation experiment, and the result proves that the DEFCM algorithm has a comparatively high detection rate in intrusion detection.


Sign in / Sign up

Export Citation Format

Share Document