A New Data Stream Clustering Approach about Intrusion Detection

Article Preview

Abstract:

Intrusion detection is one of the most important techniques for protecting network security. In addition, intrusion detection model can be used to recognize real-time pattern, which has important practical significance for real-time intrusion detection. However, due to the sheer speed and scale of the data, data points must often be analyzed in real time. The one-pass-through requirement and the lack of efficient clustering algorithms to identify intrusion patterns limit the power and scalability of this approach. A data stream clustering algorithm is proposed for real-time network intrusion detection. By introducing the new hashing mechanism, the method can quickly find the clustering patterns in the data stream. The method significantly reduces the false alarm rate of intrusion detection, and improves the performance of intrusion detection system.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 926-930)

Pages:

2898-2901

Citation:

Online since:

May 2014

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] C. Aggarwal, J. Han, J. Wang and P. Yu, A Framework for Projected Clustering of High Dimensional Data Streams [C], in Proceedings of the international conference on Very Large Databases, 2004, 852-863.

DOI: 10.1016/b978-012088469-8.50075-9

Google Scholar

[2] J. Silva, M. Klusch, S. Lodi and G. Moro, Inference Attacks in Peer-to-Peer Homogeneous distributed data mining [C], in 16th European Conference on Artificial Intelligence (ECAI), 2004, 16: 450-454.

Google Scholar

[3] FU Tao, SUN Ya-min, PSO-based k-means Algorithm and its Application in Network Intrusion Detection System [J]. Computer Science, 2011, 38(5): 54-55.

Google Scholar

[4] INDYK P, MOTWANI R. Approximate nearest neighbors: towards removing the curse of dimensionality[C]. Proceedings of the thirtieth annual ACM symposium on Theory of computing. New York, NY, USA: ACM, STOC' 98, 1998, 604-613.

DOI: 10.1145/276698.276876

Google Scholar

[5] GIONIS A, INDYK P, MOTWANI R. Similarity Search in High Dimensions via Hashing[C]. Proceedings of the 25th International Conference on Very Large Data Bases. San Francisco, CA, USA: Morgan Kaufmann Publishers Inc., VLDB' 99, 1999, 518-529.

Google Scholar

[6] Xin Sun, Yu Jiao. pGrid: Parallel Grid-Based Data Stream Clustering with Map Reduce [R]. Reports, OAK RIDGE NATIONAL LABORATORY Oak Ridge, Applied Software Engineering Research Group. (2009).

Google Scholar