Skip to main content

Research on the Application of Improved K-Means in Intrusion Detection

  • Conference paper
Information Computing and Applications (ICICA 2011)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 243))

Included in the following conference series:

  • 2239 Accesses

Abstract

To solve the shortages of traditional k-means algorithm that it needs to input the clustering number and it is sensitive to initial clustering center, the improved k-means algorithm is put forward. In the improved algorithm, each data object will be represented by the number of points around it in a certain region. Data objects will be clustered on the basis of that the distances between data objects belonging to different kinds are farther than the ones between the same. Both k-means and improved k-means are used in intrusion detection, which shows that the improved can overcome inherent disadvantages of k-means and has good clustering results.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Gao, L., Zhang, Y., Liu, H.: Research on development status and application of network intrusion detection. J. Science&Technology Information 92 (2011)

    Google Scholar 

  2. Yang, Z., Tian, D., Xiao, J.: Survey of intrusion detection technology. J. Computer Engineering and Design 27, 2119–2123 (2006)

    Google Scholar 

  3. Zhang, D., Zhang, X., Chou, J.: Application of improved k-means Algorithm in Intrusion Detection. J. Microcomputer Information 26, 11–13 (2010)

    Google Scholar 

  4. Jain, A.K., Dubes, R.C.: Algorithms for clustering data. Prentice-Hall, New Jersey (1988)

    MATH  Google Scholar 

  5. Zhang, Y.: An Improved K-means Algorithm. J. Computer Applications, 31–33 (2003)

    Google Scholar 

  6. Han, L., Wang, Q., Jiang, Z., Hao, Z.: Selection method of initial clustering center of an improved k-means. J. Computer Engineering and Applications 46, 150–152 (2010)

    Google Scholar 

  7. Guo, H., Li, T.: Research on the application of K +  mean in network intrusion detection. J. Software Guide 8, 152–154 (2009)

    Google Scholar 

  8. Chinrungrueng, C., Sequin, C.H.: Optimal adaptive k-means algorithm with dynamic adjustment of learning rate. Columbia University (2002)

    Google Scholar 

  9. Yan, X., Chu, X.: Application to Cluster Algorithm in Anomaly Detection of Network Intrusion. J. Applications of the Computer Systems 10, 34–37 (2005)

    Google Scholar 

  10. Zhang, X., Zeng, H., Jia, L.: Research of intrusion detection system dataset-KDD CUP99. J. Computer Engineering and Design, 4809–4816 (2010)

    Google Scholar 

  11. Portnoy, L., Eskin, E., Stolfo, S.J.: Intrusion Detection with Unlabeled Data Using Clustering. In: ACM CSS Workshop on Data Mining Applied to Security, Philadelphia, pp. 5–8 (2001)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Wei, M., Xia, L., Su, J. (2011). Research on the Application of Improved K-Means in Intrusion Detection. In: Liu, C., Chang, J., Yang, A. (eds) Information Computing and Applications. ICICA 2011. Communications in Computer and Information Science, vol 243. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-27503-6_92

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-27503-6_92

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-27502-9

  • Online ISBN: 978-3-642-27503-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics