Abstract
To solve the shortages of traditional k-means algorithm that it needs to input the clustering number and it is sensitive to initial clustering center, the improved k-means algorithm is put forward. In the improved algorithm, each data object will be represented by the number of points around it in a certain region. Data objects will be clustered on the basis of that the distances between data objects belonging to different kinds are farther than the ones between the same. Both k-means and improved k-means are used in intrusion detection, which shows that the improved can overcome inherent disadvantages of k-means and has good clustering results.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Gao, L., Zhang, Y., Liu, H.: Research on development status and application of network intrusion detection. J. Science&Technology Information 92 (2011)
Yang, Z., Tian, D., Xiao, J.: Survey of intrusion detection technology. J. Computer Engineering and Design 27, 2119–2123 (2006)
Zhang, D., Zhang, X., Chou, J.: Application of improved k-means Algorithm in Intrusion Detection. J. Microcomputer Information 26, 11–13 (2010)
Jain, A.K., Dubes, R.C.: Algorithms for clustering data. Prentice-Hall, New Jersey (1988)
Zhang, Y.: An Improved K-means Algorithm. J. Computer Applications, 31–33 (2003)
Han, L., Wang, Q., Jiang, Z., Hao, Z.: Selection method of initial clustering center of an improved k-means. J. Computer Engineering and Applications 46, 150–152 (2010)
Guo, H., Li, T.: Research on the application of K +  mean in network intrusion detection. J. Software Guide 8, 152–154 (2009)
Chinrungrueng, C., Sequin, C.H.: Optimal adaptive k-means algorithm with dynamic adjustment of learning rate. Columbia University (2002)
Yan, X., Chu, X.: Application to Cluster Algorithm in Anomaly Detection of Network Intrusion. J. Applications of the Computer Systems 10, 34–37 (2005)
Zhang, X., Zeng, H., Jia, L.: Research of intrusion detection system dataset-KDD CUP99. J. Computer Engineering and Design, 4809–4816 (2010)
Portnoy, L., Eskin, E., Stolfo, S.J.: Intrusion Detection with Unlabeled Data Using Clustering. In: ACM CSS Workshop on Data Mining Applied to Security, Philadelphia, pp. 5–8 (2001)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Wei, M., Xia, L., Su, J. (2011). Research on the Application of Improved K-Means in Intrusion Detection. In: Liu, C., Chang, J., Yang, A. (eds) Information Computing and Applications. ICICA 2011. Communications in Computer and Information Science, vol 243. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-27503-6_92
Download citation
DOI: https://doi.org/10.1007/978-3-642-27503-6_92
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-27502-9
Online ISBN: 978-3-642-27503-6
eBook Packages: Computer ScienceComputer Science (R0)