1. An Algorithm of Clustering by Density Peaks Using in Anomaly Detection
- Author
-
Chunyong Yin, Zhichao Yin, Jin Wang, and Sun Zhang
- Subjects
Engineering ,General Computer Science ,Network security ,business.industry ,Anomaly-based intrusion detection system ,Intrusion detection system ,computer.software_genre ,Misuse detection ,Data set ,Key (cryptography) ,Anomaly detection ,Data mining ,business ,Cluster analysis ,computer ,Algorithm - Abstract
With the development of the networks, the security of computer networks is becoming more and more serious. The information openness, sharing and interconnection are three important characteristics of computer networks. However, the amounts of intruders and attackers have been grows with the popularization of computers. Therefore, the focus of network security is preventing systems from being invaded effectively. Intrusion detection as a key technology of network security active defense system is designed to distinguish normal behaviors and attack behaviors. Intrusion detection is divided into misuse detection and anomaly detection, and using clustering algorithm is one of the most effective methods for anomaly detection. In this paper, a clustering algorithm based on fast search and find of density peaks is used to distinguish the normal and abnormal network connections to achieve the purpose of anomaly detection. The performance of the algorithm is tested by a data set selected from KDD CUP99. Experiment results show that this algorithm is more suitable than the traditional K-means in data sets containing a large amount of data and uneven density distribution.
- Published
- 2015
- Full Text
- View/download PDF