Proceedings of the 2015 International Industrial Informatics and Computer Engineering Conference

Network Intrusion Detection Based On Cluster Analysis And Multiple Core Set

Authors
Ruimei Gao, Shuyu Chen
Corresponding Author
Ruimei Gao
Available Online March 2015.
DOI
10.2991/iiicec-15.2015.9How to use a DOI?
Keywords
adaptive mechanism; artificial immune; Intrusion Detection; Cluster Analysis; Multiple Core Set
Abstract

This thesis takes researches on Network Intrusion Detection Based On Cluster Analysis And Multiple Core Set. The distributed immune intrusion detection system and the packet marking theory are used to find out the network data features of the real-time analyses; and the immune intrusion detection system is used to guide the dynamically processing of path signs technology; what’s more, the path signs technology is adopted to dynamically adaptive different methods of characteristics of network data. After that, the attack paths can be quickly identified to provide path information for feature detector on attack path in the immune intrusion detection system. Experiment results show that this scheme can quickly reconstruct the attack path information, and the performance on the aspects of the convergence is with efficiency rate and false positive rate, which is superior to the current probabilistic packet marking algorithm and can provide characteristic path information for immune intrusion detection system.

Copyright
© 2015, the Authors. Published by Atlantis Press.
Open Access
This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).

Download article (PDF)

Volume Title
Proceedings of the 2015 International Industrial Informatics and Computer Engineering Conference
Series
Advances in Computer Science Research
Publication Date
March 2015
ISBN
10.2991/iiicec-15.2015.9
ISSN
2352-538X
DOI
10.2991/iiicec-15.2015.9How to use a DOI?
Copyright
© 2015, the Authors. Published by Atlantis Press.
Open Access
This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).

Cite this article

TY  - CONF
AU  - Ruimei Gao
AU  - Shuyu Chen
PY  - 2015/03
DA  - 2015/03
TI  - Network Intrusion Detection Based On Cluster Analysis And Multiple Core Set
BT  - Proceedings of the 2015 International Industrial Informatics and Computer Engineering Conference
PB  - Atlantis Press
SP  - 36
EP  - 39
SN  - 2352-538X
UR  - https://doi.org/10.2991/iiicec-15.2015.9
DO  - 10.2991/iiicec-15.2015.9
ID  - Gao2015/03
ER  -