A Tabu Clustering algorithm for Intrusion Detection

作者: Yong Guo Liu , Xiao Feng Liao , Xue Ming Li , Zhong Fu Wu

DOI: 10.3233/IDA-2004-8402

关键词: Set (abstract data type)Intrusion detection systemComputationAdaptabilityAnomaly-based intrusion detection systemTabu searchComputer scienceFace (geometry)Cluster analysisData mining

摘要: Traditional methods of intrusion detection lack the extensibility in face changing network configurations and adaptability unknown types. Meanwhile, current machine-learning algorithms for need labeled data to be trained, so they are expensive computation sometimes misled by artificial data. In order solve these problems, a new algorithm is proposed this paper, Intrusion Detection Based on Tabu Clustering (IDBTC) algorithm. It can automatically set up clusters detect intrusions labeling normal abnormal groups. Computer simulations show that effective detection.

参考文章(33)
R. Heady, G. Luger, A. Maccabe, M. Servilla, The architecture of a network level intrusion detection system Other Information: PBD: 15 Aug 1990. ,(1990) , 10.2172/425295
Dong-Jo Park, Yong-Woon Park, Do-Jong Kim, A Novel Validity Index for Determination of the Optimal Number of Clusters IEICE Transactions on Information and Systems. ,vol. 84, pp. 281- 285 ,(2001)
Julia Allen, Alan Christie, William Fithen, John McHugh, Jed Pickel, State of the Practice of Intrusion Detection Technologies Defense Technical Information Center. ,(2000) , 10.21236/ADA375846
Eleazar Eskin, Anomaly Detection over Noisy Data using Learned Probability Distributions international conference on machine learning. pp. 255- 262 ,(2000) , 10.7916/D8C53SKF
Wenke Lee, Salvatore J. Stolfo, Data mining approaches for intrusion detection usenix security symposium. pp. 6- 6 ,(1998) , 10.21236/ADA401496
Richard C. Dubes, Anil K. Jain, Algorithms for clustering data ,(1988)
A. K. Jain, M. N. Murty, P. J. Flynn, Data clustering: a review ACM Computing Surveys. ,vol. 31, pp. 264- 323 ,(1999) , 10.1145/331499.331504