Application of Clonal Selection Clustering Algorithm for Anomaly Detec- tion in Network Security Management
نویسندگان
چکیده
Network security being of practical significance, the importance of network application, the network anomaly detection and the generalization ability are studied as a key link in the network security management. The key technology of network security management is based on: artificial intelligence theory as the research object; the clonal selection method of anomaly detection based on fuzzy clustering algorithm, to solve the anomaly detection of low efficiency; high false alarm rate, proposes the compensation method of evidence combination rule based on the rule of sharing, to solve the problem of the information fusion of evidence combination rule of conflict and defects; and P2P trust management model based on the improved evidence combination rule to solve the P2P system. It is however, difficult to effectively deal with the malicious node attack, besides it can’t effectively deal with the uncertain information and other issues.
منابع مشابه
An Adaptive LEACH-based Clustering Algorithm for Wireless Sensor Networks
LEACH is the most popular clastering algorithm in Wireless Sensor Networks (WSNs). However, it has two main drawbacks, including random selection of cluster heads, and direct communication of cluster heads with the sink. This paper aims to introduce a new centralized cluster-based routing protocol named LEACH-AEC (LEACH with Adaptive Energy Consumption), which guarantees to generate balanced cl...
متن کاملCluster Based Anomaly Detection in Wireless LAN
Data mining methods have gained importance in addressing computer network security. Existing Rule based classification models for anomaly detection are ineffective in dealing with dynamic changes in intrusion patterns and characteristic. Unsupervised learning methods have been given a closer look for network anomaly detection. We investigate hierarchical clustering algorithm for anomaly detecti...
متن کاملNetwork Planning Using Iterative Improvement Methods and Heuristic Techniques
The problem of minimum-cost expansion of power transmission network is formulated as a genetic algorithm with the cost of new lines and security constraints and Kirchhoff’s Law at each bus bar included. A genetic algorithm (GA) is a search or optimization algorithm based on the mechanics of natural selection and genetics. An applied example is presented. The results from a set of tests carried ...
متن کاملData Clustring Using A New CGA(Chaotic-Generic Algorithm) Approach
Clustering is the process of dividing a set of input data into a number of subgroups. The members of each subgroup are similar to each other but different from members of other subgroups. The genetic algorithm has enjoyed many applications in clustering data. One of these applications is the clustering of images. The problem with the earlier methods used in clustering images was in selecting in...
متن کاملAn Anomaly Detection Method Based on Fuzzy C-means Clustering Algorithm
Anomaly detection based on network flow is the basis of the monitoring and response application of anomaly, it is also the important content in the fields of network and security management. In this paper, the fuzzy C-means clustering (FCM) algorithm was applied to detect abnormality which based on network flow. For the problems of the FCM, for example, it needs to preset a number of clusters a...
متن کامل