Skip to main content

Computer Network Information Security Protection Strategy Based on Clustering Algorithms

  • Conference paper
  • First Online:

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 1146))

Abstract

The information security of computer network has been threatened unprecedentedly recently. A more efficient and accurate method is needed to detect malicious code, but the traditional algorithm only detects malicious code to a certain extent because it uses manual feature analysis. In this paper, a malicious code feature extraction method based on particle swarm optimization K-means clustering analysis algorithm is proposed. The fitness function is used to judge the quality of the particles. After the convergence of the particle swarm optimization algorithm, the k-means algorithm is continued to perform after inheriting the global optimal position, and finally the clustering results are obtained. This paper compares the missed detection rate and accuracy of the algorithm. The results indicates that the proposed algorithm has higher accuracy and lower missed detection rate than the other two traditional clustering algorithms.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Gogoi, P., Bhattacharyya, D.K., Borah, B., Kalita, J.K.: MLH-IDS: a multi-level hybrid intrusion detection method. Comput. J. 57(4), 602–623 (2013)

    Article  Google Scholar 

  2. Du, Y., Wang, X., Wang, J.: A static Android malicious code detection method based on multi-source fusion. Secur. Commun. Netw. 8(17), 3238–3246 (2015)

    Article  Google Scholar 

  3. Ashfaq, R.A.R., Wang, X.Z., Huang, J.Z., Abbas, H., He, Y.L.: Fuzziness based semi-supervised learning approach for intrusion detection system. Inf. Sci. 378, 484–497 (2017)

    Article  Google Scholar 

  4. Gandotra, E., Bansal, D., Sofat, S.: Malware analysis and classification: a survey. J. Inf. Secur. 5(02), 56 (2014)

    Google Scholar 

  5. Kim, G., Lee, S., Kim, S.: A novel hybrid intrusion detection method integrating anomaly detection with misuse detection. Expert Syst. Appl. 41(4), 1690–1700 (2014)

    Article  MathSciNet  Google Scholar 

  6. Lu, Q., Wang, Y.: Detection technology of malicious code based on semantic. Multimedia Tools Appl. 76(19), 19543–19555 (2017)

    Article  Google Scholar 

  7. Al-Yaseen, W.L., Othman, Z.A., Nazri, M.Z.A.: Multi-level hybrid support vector machine and extreme learning machine based on modified K-means for intrusion detection system. Expert Syst. Appl. 67, 296–303 (2017)

    Article  Google Scholar 

  8. Thakare, Y.S., Bagal, S.B.: Performance evaluation of K-means clustering algorithm with various distance metrics. Int. J. Comput. Appl. 110(11), 12–16 (2015)

    Google Scholar 

  9. Li, S.H., Kao, Y.C., Zhang, Z.C., Chuang, Y.P., Yen, D.C.: A network behavior-based botnet detection mechanism using PSO and k-means. ACM Trans. Manag. Inf. Syst. (TMIS) 6(1), 3 (2015)

    Google Scholar 

  10. Bostani, H., Sheikhan, M.: Modification of supervised OPF-based intrusion detection systems using unsupervised learning and social network concept. Pattern Recogn. 62, 56–72 (2017)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Bingjie Liu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Liu, B. (2020). Computer Network Information Security Protection Strategy Based on Clustering Algorithms. In: Xu, Z., Parizi, R., Hammoudeh, M., Loyola-González, O. (eds) Cyber Security Intelligence and Analytics. CSIA 2020. Advances in Intelligent Systems and Computing, vol 1146. Springer, Cham. https://doi.org/10.1007/978-3-030-43306-2_1

Download citation

Publish with us

Policies and ethics