Paper Title:
The Study of Invasion Examination Algorithm Based on Improvement Fuzzy C Means
  Abstract

This paper put forward intrusion detection algorithm based on improved fuzzy C means (FCM) algorithm and execute the anomaly detection on KDDCUP data set, build intrusion detection system based improved algorithm and analyze the feasibility of the system. Through the fuzzy C means value's improvement algorithm, solve the fuzzy C means value algorithm problem that the algorithm sensitive to selection of the initial values and easily to fall in the local best solution. Thereby under the condition guarantee integrality and consistency of data attribute values, get rid of blindness of selecting initial value and reduce clustering time and algorithm complexity, enhance speed of the algorithm.

  Info
Periodical
Edited by
Yanwen Wu
Pages
720-725
DOI
10.4028/www.scientific.net/AMR.267.720
Citation
K. Chen, W. D. Ke, "The Study of Invasion Examination Algorithm Based on Improvement Fuzzy C Means", Advanced Materials Research, Vol. 267, pp. 720-725, 2011
Online since
June 2011
Authors
Export
Price
$32.00
Share

In order to see related information, you need to Login.

In order to see related information, you need to Login.

Authors: Zhong Ping Zhang, Yong Xin Liang
Abstract:This paper proposes a new data stream outlier detection algorithm SODRNN based on reverse nearest neighbors. We deal with the sliding window...
1032
Authors: Dong Wang, Shi Huan Xiong
Chapter 8: Nanomaterials and Nanomanufacturing
Abstract:The learning sequence is an important factor of affecting the study effect about incremental Bayesian classifier. Reasonable learning...
1455
Authors: Rui Ni Li, Xiao Yi Wang, Zai Wen Liu, Ji Ping Xu, Ling Bin Wang
Chapter 4: Waste Disposal and Recycling
Abstract:Various unusual conditions are likely to occur during sewage treatment process, which would lead to some consequences such as the decrease of...
622
Authors: Shu Hua Ma, Jin Kuan Wang, Zhi Gang Liu, Hou Yan Jiang
Chapter 1: Applied Mechanics and Measurement Technology of Detection and Monitoring
Abstract:Data measured and collected by WSNs is often unreliable and a big amount of anomaly data exist. Detecting these anomaly in energy-constrained...
226
Authors: Jun Tan
Chapter 12: Computer-Aided Design and Applications in Industry and Civil Engineering
Abstract:Online mining of frequent closed itemsets over streaming data is one of the most important issues in mining data streams. In this paper, we...
2910