Skip to main content
Top

2017 | OriginalPaper | Chapter

Application of an Improved Data Stream Clustering Algorithm in Intrusion Detection System

Authors : Chunyong Yin, Lian Xia, Jin Wang

Published in: Advanced Multimedia and Ubiquitous Engineering

Publisher: Springer Singapore

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

With the continuous development of computer network technology, traditional intrusion detection system is short of good adaptability. Aiming at the traditional intrusion detection system is difficult to adapt to the increasing amount of data demand for real-time processing capability, this paper proposes a clustering algorithm based on sliding window data streams, based on which we build the IDS network security defense model. The experiment results show that the model is able to adapt to the high-speed network intrusion detection requirements.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Yin, C.Y., Ma, L.Y., Feng, L.: A feature selection method for improved clonal algorithm towards intrusion detection. Int. J. Pattern Recogn. Artif. Intell. 30(5), 1–14 (2016)CrossRef Yin, C.Y., Ma, L.Y., Feng, L.: A feature selection method for improved clonal algorithm towards intrusion detection. Int. J. Pattern Recogn. Artif. Intell. 30(5), 1–14 (2016)CrossRef
2.
go back to reference Rajput, R., Mishra, A., Kumar, S.: Optimize intrusion prevention and minimization of threats for stream data classification. In: Fourth International Conference on Communication Systems and Network Technologies, pp. 408–413 (2014) Rajput, R., Mishra, A., Kumar, S.: Optimize intrusion prevention and minimization of threats for stream data classification. In: Fourth International Conference on Communication Systems and Network Technologies, pp. 408–413 (2014)
3.
go back to reference Yin, C.Y., Feng, L., Ma, L.Y., Kim, J.Y., Wang, J.: An effective feature selection and data-stream classification model HDP. J. Internet Technol. 17(4), 695–702 (2016) Yin, C.Y., Feng, L., Ma, L.Y., Kim, J.Y., Wang, J.: An effective feature selection and data-stream classification model HDP. J. Internet Technol. 17(4), 695–702 (2016)
4.
go back to reference Chen, Z.J., Zhang, H.L., Hatcher, W.G., Nguyen, J., Yu, W.: A streaming-based network monitoring and threat detection system. In: IEEE 14th International Conference on Software Engineering Research, Management and Applications (SERA), pp. 31–37 (2016) Chen, Z.J., Zhang, H.L., Hatcher, W.G., Nguyen, J., Yu, W.: A streaming-based network monitoring and threat detection system. In: IEEE 14th International Conference on Software Engineering Research, Management and Applications (SERA), pp. 31–37 (2016)
5.
go back to reference Yin, C.Y., Zhang, S., Xi, J.W.: An improved anonymity model for big data security based on clustering algorithm. Concurr. Comput. Pract. Exp. 29(7), 1–13 (2016) Yin, C.Y., Zhang, S., Xi, J.W.: An improved anonymity model for big data security based on clustering algorithm. Concurr. Comput. Pract. Exp. 29(7), 1–13 (2016)
6.
go back to reference Gao, H.W., Zhu, D.J., Wang, X.M.: A parallel clustering ensemble algorithm for intrusion detection system. In: Ninth International Symposium on Distributed Computing and Applications to Business, Engineering and Science, pp. 450–453 (2011) Gao, H.W., Zhu, D.J., Wang, X.M.: A parallel clustering ensemble algorithm for intrusion detection system. In: Ninth International Symposium on Distributed Computing and Applications to Business, Engineering and Science, pp. 450–453 (2011)
7.
go back to reference Zhu, C.S., Dun, X., Zhu, L.: A study on the application of data stream clustering mining through a sliding and damped window to intrusion detection. In: Fourth International Conference on Information and Computing, pp. 22–26 (2011) Zhu, C.S., Dun, X., Zhu, L.: A study on the application of data stream clustering mining through a sliding and damped window to intrusion detection. In: Fourth International Conference on Information and Computing, pp. 22–26 (2011)
Metadata
Title
Application of an Improved Data Stream Clustering Algorithm in Intrusion Detection System
Authors
Chunyong Yin
Lian Xia
Jin Wang
Copyright Year
2017
Publisher
Springer Singapore
DOI
https://doi.org/10.1007/978-981-10-5041-1_99

Premium Partner