Application of hospital information security intrusion detection system based on the new NPRIM algorithm
- https://doi.org/10.2991/icimm-16.2016.80How to use a DOI?
- clustering, boundary point detection, Intrusion detection
The specific model of intrusion detection based on clustering and boundary points detection was elaborateed in this paper, and the data processing, clustering analysis, intrusion judgment, intrusion response, typical data warehousing the five stages are described in detail; Then the experimental environment and the experimental results were compared and analyzed, and further validation based on the improved NPRIM algorithm of the project team applied to intrusion detection is effective and feasible.
- © 2016, the Authors. Published by Atlantis Press.
- Open Access
- This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).
Cite this article
TY - CONF AU - Xingshan Li AU - Min Xu PY - 2016/11 DA - 2016/11 TI - Application of hospital information security intrusion detection system based on the new NPRIM algorithm BT - Proceedings of the 6th International Conference on Information Engineering for Mechanics and Materials PB - Atlantis Press SP - 445 EP - 449 SN - 2352-5401 UR - https://doi.org/10.2991/icimm-16.2016.80 DO - https://doi.org/10.2991/icimm-16.2016.80 ID - Li2016/11 ER -