The Study on Network Intrusion Detection Based on Improved K-means Algorithm

  • Conference paper
  • First Online:
Proceedings of the 2012 International Conference on Cybernetics and Informatics

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 163))

  • 155 Accesses

Abstract

In this paper, we put forward an intrusion detection method based on k-means algorithm in accordance with the existing network intrusion detection problem. As can be seen from experimental result, the use of algorithm can be effectively separated normal and abnormal data. The application of k-means algorithm is feasible and effective.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 429.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 549.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free ship** worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Junlan Yao (2010) Intrusion detection technology and its future trend. Info Technol 10(4):172–174

    Google Scholar 

  2. Tang Zhengjun (2010) Analysis and implementation of network intrusion detection system. Bei**g: publishing house of electronics industry 4:22–26

    Google Scholar 

  3. Han Jiawei, Kamber M (2009) Data Mining Concepts and Techniques [M]. China Machine Press

    Google Scholar 

  4. Pal NR, Bezdek JC (1995) On clustering for the fuzzy C–means model [J]. IEEE Trans FS 3(3):370–379

    Google Scholar 

  5. Bai Kun (2008) Research of Fuzzy Clustering Algorithm and Its Application on Web Session [D]. Dalian Maritime university

    Google Scholar 

  6. Gao Jisen, Zhao Jie, Zhang Zhongfu, Zhang **g (2008) An enhanced k-means clustering algorithm approach to intrusion detection [J] 24(3):72–73

    Google Scholar 

  7. Yao Min (2006) Application of fuzzy clustering algorithm. [D]. Zhejiang University

    Google Scholar 

  8. Denning DE (1987) An intrusion detection model [J]. IEEE Trans on Software Engineering 13(2):222–232

    Article  Google Scholar 

  9. Wu Rong Hui, Liang Yi Ming, Yu Fei, Xu Cheng (2008) Modeling of DDoS Alarm Based on Fuzzy C-Mean s Algorithm. Journal of Chinese Computer Systems 29(6)

    Google Scholar 

  10. http://kdd.ics.uci.edu/databases/kddcup99. Kddcup 99 dataset.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Zheng Yanjun .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer Science+Business Media New York

About this paper

Cite this paper

Yanjun, Z. (2014). The Study on Network Intrusion Detection Based on Improved K-means Algorithm. In: Zhong, S. (eds) Proceedings of the 2012 International Conference on Cybernetics and Informatics. Lecture Notes in Electrical Engineering, vol 163. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-3872-4_50

Download citation

  • DOI: https://doi.org/10.1007/978-1-4614-3872-4_50

  • Published:

  • Publisher Name: Springer, New York, NY

  • Print ISBN: 978-1-4614-3871-7

  • Online ISBN: 978-1-4614-3872-4

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics

Navigation