Application of Clonal Selection Clustering Algorithm for Anomaly Detec- tion in Network Security Management

نویسندگان

  • Qian Zhang
  • Xiaoyu Wang
  • Yan Li
چکیده

Network security being of practical significance, the importance of network application, the network anomaly detection and the generalization ability are studied as a key link in the network security management. The key technology of network security management is based on: artificial intelligence theory as the research object; the clonal selection method of anomaly detection based on fuzzy clustering algorithm, to solve the anomaly detection of low efficiency; high false alarm rate, proposes the compensation method of evidence combination rule based on the rule of sharing, to solve the problem of the information fusion of evidence combination rule of conflict and defects; and P2P trust management model based on the improved evidence combination rule to solve the P2P system. It is however, difficult to effectively deal with the malicious node attack, besides it can’t effectively deal with the uncertain information and other issues.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An Adaptive LEACH-based Clustering Algorithm for Wireless Sensor Networks

LEACH is the most popular clastering algorithm in Wireless Sensor Networks (WSNs). However, it has two main drawbacks, including random selection of cluster heads, and direct communication of cluster heads with the sink. This paper aims to introduce a new centralized cluster-based routing protocol named LEACH-AEC (LEACH with Adaptive Energy Consumption), which guarantees to generate balanced cl...

متن کامل

Cluster Based Anomaly Detection in Wireless LAN

Data mining methods have gained importance in addressing computer network security. Existing Rule based classification models for anomaly detection are ineffective in dealing with dynamic changes in intrusion patterns and characteristic. Unsupervised learning methods have been given a closer look for network anomaly detection. We investigate hierarchical clustering algorithm for anomaly detecti...

متن کامل

Network Planning Using Iterative Improvement Methods and Heuristic Techniques

The problem of minimum-cost expansion of power transmission network is formulated as a genetic algorithm with the cost of new lines and security constraints and Kirchhoff’s Law at each bus bar included. A genetic algorithm (GA) is a search or optimization algorithm based on the mechanics of natural selection and genetics. An applied example is presented. The results from a set of tests carried ...

متن کامل

Data Clustring Using A New CGA(Chaotic-Generic Algorithm) Approach

Clustering is the process of dividing a set of input data into a number of subgroups. The members of each subgroup are similar to each other but different from members of other subgroups. The genetic algorithm has enjoyed many applications in clustering data. One of these applications is the clustering of images. The problem with the earlier methods used in clustering images was in selecting in...

متن کامل

An Anomaly Detection Method Based on Fuzzy C-means Clustering Algorithm

Anomaly detection based on network flow is the basis of the monitoring and response application of anomaly, it is also the important content in the fields of network and security management. In this paper, the fuzzy C-means clustering (FCM) algorithm was applied to detect abnormality which based on network flow. For the problems of the FCM, for example, it needs to preset a number of clusters a...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2016