Abstract
In view of the Intrusion detection technology in the network examination had the more or less false alarm rate and the undetected rate question, this article has introduced the fuzzy clustering algorithm, Proposed the intrusion detection engine based on fuzzy clustering algorithm, Analysis of perturbation-based fuzzy clustering methods and for mixed data from the feedback fuzzy clustering algorithm, used KDD99 data sets to verify algorithm performance, the experiment comparison fuzzy clustering method based on Transitive closure method , it is shown this algorithm in the false positive rate have obviously advantages, justify the intrusion detection algorithm to construct intrusion detection engine is feasible.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Dieter Gollmann: Zhang Xiaosong, etc. Translation. Computer security, (2005)
Tang Zhengjun: the network intrusion detection system of design and implementation. Electronic Industry Press, (2003)1–8
Dunn JC: A Fuzzy Relative of the ISODATA Processed Its Use in Detecting Compact Well-Separated Cluster. Caber, net J,(1974):1–8.
Jiawei Han, Jianhua Sun, Hao Chen, Zongfen Han: A Fuzzy Data Mining Based Intrusion Detection Model. IEEE (2004)
Li Yunjie, Guanxin, Wang Shiyun: One new invasion defense attack system model based on fuzzy clustering. world science and technology research and development. (2010) 449–452.
Ding Shouxue, Su Rong, and Fan Yuling: Improves the fuzzy clustering algorithm in invasion examination application. (2009) 6885–6886
Ding Guoliang, Wang Xiwu, Yang Sumin: invasion examination method Based on fuzzy clustering, Journal of Ordnance Engineering College, (2005)61–63
Yan Jun: Fuzzy clustering algorithm applied research, Zhejiang University, (2006) 35–40.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag London Limited
About this paper
Cite this paper
Fei, L., Zhang, J., Li, Q. (2012). Applied Study of Fuzzy Clustering Algorithm in Invasion Detection. In: Zhu, R., Ma, Y. (eds) Information Engineering and Applications. Lecture Notes in Electrical Engineering, vol 154. Springer, London. https://doi.org/10.1007/978-1-4471-2386-6_51
Download citation
DOI: https://doi.org/10.1007/978-1-4471-2386-6_51
Publisher Name: Springer, London
Print ISBN: 978-1-4471-2385-9
Online ISBN: 978-1-4471-2386-6
eBook Packages: EngineeringEngineering (R0)