Research on Intrusion Clustering in the Cloud Platform Based on Kohonen Neural Network

Article Preview

Abstract:

With the wide application of cloud platform, information security based on cloud platform has become a research hot point. In this paper, by analyzing the security features of the cloud platform, researched the intrusion clustering based on Kohonen neural network, and proposed a new framework, and improved the weights of output layer. With the software Matlab simulation, the experimental results were satisfactory, illustrated that invasion clustering of neural network based on cloud platform took good effect.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

859-863

Citation:

Online since:

July 2013

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] B.R. Kandukuri, V.R. Paturi, A. Rakshit: Cloud security issues. In: IEEE international conference on services computing, (2009), p.517–520

DOI: 10.1109/scc.2009.84

Google Scholar

[2] D.Scharstein, R. Szeliski. Middlebury stereo vision page. http://www.middlebury.edu/ stereo/

Google Scholar

[3] M.C. Procopiuc: Clustering Problems and Their Applications. (USA:Department of Computer Science, Duke University,1997)

Google Scholar

[4] J.K. Hunt, D. Sbarbaro, R. Zbikowski: Neural networks for control systems survey. Automatics, Vol.28(1992),pp.1083-1112

Google Scholar

[5] J. Zhang: Intrusion detection based on cloud model and BP neural networks [J]. Transducer and Microsystem Technologies, Vol.30 (2011), pp.116-118

Google Scholar

[6] R. Sebastian, Ch. Feng, M. Christoph: Intrusion Detection in the Cloud. Eighth IEEE International Conference on Dependable, (2009), pp.729-734

Google Scholar

[7] Information on http://baike.baidu.com/view/758747.htm

Google Scholar

[8] C.P. Liu: Comparison of clustering methods based on Kohonen neural network in remote sensing classification.Computer Applications, Vol.26 (2006), pp.1744-1750

Google Scholar

[9] T. Kohonen. Engineering Application of SOM. IEEE Transaction on Neural Network, Vol.14 (1996), pp.1358-1383

Google Scholar

[10] M. Gu, M.F. Wang: Application of Chi-square static technology in anomaly detection of computer information system. Computer Applications, Vol.26 (2006), pp.320-322

Google Scholar