Improved clustering algorithm based on high-speed network data stream

With the continuous development of network technology, the attack has become the biggest threat to the stable operation of the network. Intrusion detection technology is a proactive safety protection measure which provides real-time monitoring of internal attacks, external attacks, and misuse. Traditional intrusion detection system is short of adaptability due to the complication and scale of the network. The main problem is that the real-time performance of the network is poor and the reliability is not high. This paper designs the intrusion detection mechanism combined with data stream clustering algorithm and intrusion detection system to solve the problem in processing a large amount of high-speed data streams. The performance of processing data streams is improved through the clustering algorithm based on density and the sliding window and the experiments show that the intrusion detection efficiency is higher than DenStream algorithm.

[1]  Xiangliang Zhang,et al.  Autonomic intrusion detection: Adaptively detecting anomalies over unlabeled audit data streams in computer networks , 2014, Knowl. Based Syst..

[2]  Bin Gu,et al.  Incremental Support Vector Learning for Ordinal Regression , 2015, IEEE Transactions on Neural Networks and Learning Systems.

[3]  Bin Gu,et al.  Incremental learning for ν-Support Vector Regression , 2015, Neural Networks.

[4]  Dong Hyun Jeong,et al.  A survey of cloud-based network intrusion detection analysis , 2016, Human-centric Computing and Information Sciences.

[5]  KeeganNathan,et al.  A survey of cloud-based network intrusion detection analysis , 2016 .

[6]  Wei Yu,et al.  A streaming-based network monitoring and threat detection system , 2016, 2016 IEEE 14th International Conference on Software Engineering Research, Management and Applications (SERA).

[7]  Guo Shan Anomaly Intrusion Detection Based on Data Stream , 2007 .

[8]  Lin Zhu,et al.  A Study on the Application of Data Stream Clustering Mining through a Sliding and Damped Window to Intrusion Detection , 2011, 2011 Fourth International Conference on Information and Computing.

[9]  Jin Wang,et al.  An improved anonymity model for big data security based on clustering algorithm , 2017, Concurr. Comput. Pract. Exp..

[10]  Wu Hai-feng Research on Data Mining Technology and Tools , 2003 .

[11]  Xuejun Liu Mining Frequent Patterns in Data Streams , 2005 .

[12]  Peng Shi,et al.  Learning very fast decision tree from uncertain data streams with positive and unlabeled samples , 2012, Inf. Sci..

[13]  Matthew O. Ward,et al.  Shared execution strategy for neighbor-based pattern mining requests over streaming windows , 2012, ACM Trans. Database Syst..

[14]  Tirtharaj Dash,et al.  A study on intrusion detection using neural networks trained with evolutionary algorithms , 2017, Soft Comput..

[15]  Cai Yingkun An Improved DBSCAN Algorithm which is Insensitive to Input Parameters , 2004 .

[16]  Xiaomin Wang,et al.  A Parallel Clustering Ensemble Algorithm for Intrusion Detection System , 2010, 2010 Ninth International Symposium on Distributed Computing and Applications to Business, Engineering and Science.

[17]  Ira Assent,et al.  Self-Adaptive Anytime Stream Clustering , 2009, 2009 Ninth IEEE International Conference on Data Mining.

[18]  Sushil Jajodia,et al.  ADAM: a testbed for exploring the use of data mining in intrusion detection , 2001, SGMD.

[19]  Alfred O. Hero,et al.  Adaptive evolutionary clustering , 2011, Data Mining and Knowledge Discovery.

[20]  Lu Feng,et al.  A Feature Selection Method for Improved Clonal Algorithm Towards Intrusion Detection , 2016, Int. J. Pattern Recognit. Artif. Intell..

[21]  Xia Lu SA-DBSCAN:A self-adaptive density-based clustering algorithm , 2009 .

[22]  Salvatore J. Stolfo,et al.  Mining Audit Data to Build Intrusion Detection Models , 1998, KDD.

[23]  Jin Wang,et al.  An Effective Feature Selection and Data-Stream Classification Model HDP , 2016 .

[24]  Peter Xiaoping Liu,et al.  Distributed Combined Authentication and Intrusion Detection With Data Fusion in High-Security Mobile Ad Hoc Networks , 2010, IEEE Transactions on Vehicular Technology.

[25]  Madhu Sharma Gaur,et al.  Trusted and secure clustering in mobile pervasive environment , 2015, Human-centric Computing and Information Sciences.

[26]  Donggang Yu,et al.  Segmentation, recognition and tracing analysis for high-content cell-cycle screening , 2007 .

[27]  Sandeep Kumar,et al.  Optimize Intrusion Prevention and Minimization of Threats for Stream Data Classification , 2014, 2014 Fourth International Conference on Communication Systems and Network Technologies.

[28]  Ira Assent,et al.  The ClusTree: indexing micro-clusters for anytime stream mining , 2011, Knowledge and Information Systems.