Paper Title:
The Improved K-Means Algorithm in Intrusion Detection System Research
  Abstract

To improve the efficiency of Internet intrusion detection, data mining is adopted in intrusion detection. The paper introduces the concept of intrusion detection and k-means algorithm. For the defect of K-means algorithm, it proposes an improved K-means algorithm. Experiments show that the improved k-means algorithm can get a better detection rate.

  Info
Periodical
Chapter
Chapter 3: Computational Methods for Engineering
Edited by
Elwin Mao and Linli Xu
Pages
204-208
DOI
10.4028/www.scientific.net/AEF.1.204
Citation
H. B. Zhang, Y. Jiang, "The Improved K-Means Algorithm in Intrusion Detection System Research", Advanced Engineering Forum, Vol. 1, pp. 204-208, 2011
Online since
September 2011
Export
Share

In order to see related information, you need to Login.

In order to see related information, you need to Login.

Authors: Zhong Ping Zhang, Yong Xin Liang
Abstract:This paper proposes a new data stream outlier detection algorithm SODRNN based on reverse nearest neighbors. We deal with the sliding window...
1032
Authors: Dong Wang, Shi Huan Xiong
Chapter 8: Nanomaterials and Nanomanufacturing
Abstract:The learning sequence is an important factor of affecting the study effect about incremental Bayesian classifier. Reasonable learning...
1455
Authors: Rui Ni Li, Xiao Yi Wang, Zai Wen Liu, Ji Ping Xu, Ling Bin Wang
Chapter 4: Waste Disposal and Recycling
Abstract:Various unusual conditions are likely to occur during sewage treatment process, which would lead to some consequences such as the decrease of...
622
Authors: Rui Ren
Chapter 10: Intelligence Algorithm, Optimization Algorithm and their Applications
Abstract:Wireless sensor network is added on traditional GPS to realize double location in this paper. The widely used distributed distance measure...
1561
Authors: Shu Hua Ma, Jin Kuan Wang, Zhi Gang Liu, Hou Yan Jiang
Chapter 1: Applied Mechanics and Measurement Technology of Detection and Monitoring
Abstract:Data measured and collected by WSNs is often unreliable and a big amount of anomaly data exist. Detecting these anomaly in energy-constrained...
226