Intelligent Detection Method of Computer Network Intrusion based on Big Data Clustering Algorithm

Jiyin Zhou
{"title":"Intelligent Detection Method of Computer Network Intrusion based on Big Data Clustering Algorithm","authors":"Jiyin Zhou","doi":"10.1109/ICICACS57338.2023.10099701","DOIUrl":null,"url":null,"abstract":"N etwork technology is rapidly developing and the Internet has penetrated into every step of people's daily production life. As the importance of the Internet continues to strengthen, security issues are becoming increasingly acute. And the network security problem in the context of big data (BD) presents the characteristics of new mode, large scale and high concealment. Therefore, the research of IDM based on BD features has received wide attention in the field of network security and is applied in various fields. In this paper, we propose an intelligent detection method for computer network intrusion based on BD clustering algorithm for the lack of relevance, timeliness and targeting of current computer network intrusion event detection technology. Firstly, the network intrusion events are classified, and the contents contained in the target files are obtained by clustering algorithm clustering, then the files are clustered and analyzed using neural network, and the intrusion events are classified according to the classification results after clustering. The ID results implemented based on the clustering algorithm can be compared and analyzed with traditional methods. Firstly, the data is pre-processed in the data mining module and then the data set is constructed for clustering training; then the data is clustered after training set by cross-validating and calculating the classification results. After training to get the sample set again to cluster the data training set samples using Number Stata 2 training set data using randomly generated sample dataset; finally get the model dataset using the algorithm proposed in this paper to classify the target documents. In the experiment detection results show that: the intrusion strategy obtained after clustering analysis is significantly more accurate compared with the ID results; detection accuracy can reach 93.3%; has the advantages of good detection effect and detection speed.","PeriodicalId":274807,"journal":{"name":"2023 IEEE International Conference on Integrated Circuits and Communication Systems (ICICACS)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-02-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 IEEE International Conference on Integrated Circuits and Communication Systems (ICICACS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICICACS57338.2023.10099701","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

N etwork technology is rapidly developing and the Internet has penetrated into every step of people's daily production life. As the importance of the Internet continues to strengthen, security issues are becoming increasingly acute. And the network security problem in the context of big data (BD) presents the characteristics of new mode, large scale and high concealment. Therefore, the research of IDM based on BD features has received wide attention in the field of network security and is applied in various fields. In this paper, we propose an intelligent detection method for computer network intrusion based on BD clustering algorithm for the lack of relevance, timeliness and targeting of current computer network intrusion event detection technology. Firstly, the network intrusion events are classified, and the contents contained in the target files are obtained by clustering algorithm clustering, then the files are clustered and analyzed using neural network, and the intrusion events are classified according to the classification results after clustering. The ID results implemented based on the clustering algorithm can be compared and analyzed with traditional methods. Firstly, the data is pre-processed in the data mining module and then the data set is constructed for clustering training; then the data is clustered after training set by cross-validating and calculating the classification results. After training to get the sample set again to cluster the data training set samples using Number Stata 2 training set data using randomly generated sample dataset; finally get the model dataset using the algorithm proposed in this paper to classify the target documents. In the experiment detection results show that: the intrusion strategy obtained after clustering analysis is significantly more accurate compared with the ID results; detection accuracy can reach 93.3%; has the advantages of good detection effect and detection speed.
基于大数据聚类算法的计算机网络入侵智能检测方法
网络技术正在迅速发展,互联网已经渗透到人们日常生产生活的每一个环节。随着互联网重要性的不断增强,安全问题也日益突出。大数据背景下的网络安全问题呈现出模式新、规模大、隐蔽性高等特点。因此,基于BD特征的IDM研究在网络安全领域受到了广泛的关注,并在各个领域得到了应用。针对当前计算机网络入侵事件检测技术缺乏相关性、时效性和针对性的不足,本文提出了一种基于BD聚类算法的计算机网络入侵智能检测方法。首先对网络入侵事件进行分类,利用聚类算法聚类得到目标文件中包含的内容,然后利用神经网络对文件进行聚类分析,根据聚类后的分类结果对入侵事件进行分类。基于聚类算法实现的ID结果可以与传统方法进行比较和分析。首先在数据挖掘模块中对数据进行预处理,然后构造数据集进行聚类训练;然后通过交叉验证和计算分类结果,对训练集后的数据进行聚类。训练后得到的样本集再次聚类数据训练集样本使用Stata第2训练集数据使用随机生成的样本数据集;最后利用本文提出的算法得到模型数据集,对目标文档进行分类。实验检测结果表明:聚类分析后得到的入侵策略较ID结果准确率显著提高;检测精度可达93.3%;具有检测效果好、检测速度快等优点。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信