Skip to main content

2017 | OriginalPaper | Buchkapitel

Application of an Improved Data Stream Clustering Algorithm in Intrusion Detection System

verfasst von : Chunyong Yin, Lian Xia, Jin Wang

Erschienen in: Advanced Multimedia and Ubiquitous Engineering

Verlag: Springer Singapore

Aktivieren Sie unsere intelligente Suche um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

With the continuous development of computer network technology, traditional intrusion detection system is short of good adaptability. Aiming at the traditional intrusion detection system is difficult to adapt to the increasing amount of data demand for real-time processing capability, this paper proposes a clustering algorithm based on sliding window data streams, based on which we build the IDS network security defense model. The experiment results show that the model is able to adapt to the high-speed network intrusion detection requirements.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Yin, C.Y., Ma, L.Y., Feng, L.: A feature selection method for improved clonal algorithm towards intrusion detection. Int. J. Pattern Recogn. Artif. Intell. 30(5), 1–14 (2016)CrossRef Yin, C.Y., Ma, L.Y., Feng, L.: A feature selection method for improved clonal algorithm towards intrusion detection. Int. J. Pattern Recogn. Artif. Intell. 30(5), 1–14 (2016)CrossRef
2.
Zurück zum Zitat Rajput, R., Mishra, A., Kumar, S.: Optimize intrusion prevention and minimization of threats for stream data classification. In: Fourth International Conference on Communication Systems and Network Technologies, pp. 408–413 (2014) Rajput, R., Mishra, A., Kumar, S.: Optimize intrusion prevention and minimization of threats for stream data classification. In: Fourth International Conference on Communication Systems and Network Technologies, pp. 408–413 (2014)
3.
Zurück zum Zitat Yin, C.Y., Feng, L., Ma, L.Y., Kim, J.Y., Wang, J.: An effective feature selection and data-stream classification model HDP. J. Internet Technol. 17(4), 695–702 (2016) Yin, C.Y., Feng, L., Ma, L.Y., Kim, J.Y., Wang, J.: An effective feature selection and data-stream classification model HDP. J. Internet Technol. 17(4), 695–702 (2016)
4.
Zurück zum Zitat Chen, Z.J., Zhang, H.L., Hatcher, W.G., Nguyen, J., Yu, W.: A streaming-based network monitoring and threat detection system. In: IEEE 14th International Conference on Software Engineering Research, Management and Applications (SERA), pp. 31–37 (2016) Chen, Z.J., Zhang, H.L., Hatcher, W.G., Nguyen, J., Yu, W.: A streaming-based network monitoring and threat detection system. In: IEEE 14th International Conference on Software Engineering Research, Management and Applications (SERA), pp. 31–37 (2016)
5.
Zurück zum Zitat Yin, C.Y., Zhang, S., Xi, J.W.: An improved anonymity model for big data security based on clustering algorithm. Concurr. Comput. Pract. Exp. 29(7), 1–13 (2016) Yin, C.Y., Zhang, S., Xi, J.W.: An improved anonymity model for big data security based on clustering algorithm. Concurr. Comput. Pract. Exp. 29(7), 1–13 (2016)
6.
Zurück zum Zitat Gao, H.W., Zhu, D.J., Wang, X.M.: A parallel clustering ensemble algorithm for intrusion detection system. In: Ninth International Symposium on Distributed Computing and Applications to Business, Engineering and Science, pp. 450–453 (2011) Gao, H.W., Zhu, D.J., Wang, X.M.: A parallel clustering ensemble algorithm for intrusion detection system. In: Ninth International Symposium on Distributed Computing and Applications to Business, Engineering and Science, pp. 450–453 (2011)
7.
Zurück zum Zitat Zhu, C.S., Dun, X., Zhu, L.: A study on the application of data stream clustering mining through a sliding and damped window to intrusion detection. In: Fourth International Conference on Information and Computing, pp. 22–26 (2011) Zhu, C.S., Dun, X., Zhu, L.: A study on the application of data stream clustering mining through a sliding and damped window to intrusion detection. In: Fourth International Conference on Information and Computing, pp. 22–26 (2011)
Metadaten
Titel
Application of an Improved Data Stream Clustering Algorithm in Intrusion Detection System
verfasst von
Chunyong Yin
Lian Xia
Jin Wang
Copyright-Jahr
2017
Verlag
Springer Singapore
DOI
https://doi.org/10.1007/978-981-10-5041-1_99