{"title":"基于遗传k -均值算法的无线传感器网络入侵检测","authors":"G. Sandhya, A. Julian","doi":"10.1109/ICACCCT.2014.7019418","DOIUrl":null,"url":null,"abstract":"Security of communication systems has become a crucial issue. A harder problem to crack in the field of Network Security is the identification and prevention of attacks. An effective Intrusion Detection System (IDS) is essential for ensuring network security. Intrusion detection systems include pattern analysis techniques to discover useful patterns of system features. These patterns describe user behavior. Anomalies are computed using the set of relevant system features. The derived patterns comprise inputs of classification systems, which are based on statistical and machine learning pattern recognition techniques. Clustering methods are useful in detection of unknown attack patterns. Elimination of insignificant features is essential for a simplified, faster and more accurate detection of attacks. Genetic algorithm based clustering offers identification of significant reduced input features. We present a conceptual framework for identifying attacks for intrusion detection by applying genetic K-means algorithm.","PeriodicalId":239918,"journal":{"name":"2014 IEEE International Conference on Advanced Communications, Control and Computing Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"21","resultStr":"{\"title\":\"Intrusion detection in wireless sensor network using genetic K-means algorithm\",\"authors\":\"G. Sandhya, A. Julian\",\"doi\":\"10.1109/ICACCCT.2014.7019418\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Security of communication systems has become a crucial issue. A harder problem to crack in the field of Network Security is the identification and prevention of attacks. An effective Intrusion Detection System (IDS) is essential for ensuring network security. Intrusion detection systems include pattern analysis techniques to discover useful patterns of system features. These patterns describe user behavior. Anomalies are computed using the set of relevant system features. The derived patterns comprise inputs of classification systems, which are based on statistical and machine learning pattern recognition techniques. Clustering methods are useful in detection of unknown attack patterns. Elimination of insignificant features is essential for a simplified, faster and more accurate detection of attacks. Genetic algorithm based clustering offers identification of significant reduced input features. We present a conceptual framework for identifying attacks for intrusion detection by applying genetic K-means algorithm.\",\"PeriodicalId\":239918,\"journal\":{\"name\":\"2014 IEEE International Conference on Advanced Communications, Control and Computing Technologies\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2014-05-08\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"21\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2014 IEEE International Conference on Advanced Communications, Control and Computing Technologies\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICACCCT.2014.7019418\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 IEEE International Conference on Advanced Communications, Control and Computing Technologies","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICACCCT.2014.7019418","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Intrusion detection in wireless sensor network using genetic K-means algorithm
Security of communication systems has become a crucial issue. A harder problem to crack in the field of Network Security is the identification and prevention of attacks. An effective Intrusion Detection System (IDS) is essential for ensuring network security. Intrusion detection systems include pattern analysis techniques to discover useful patterns of system features. These patterns describe user behavior. Anomalies are computed using the set of relevant system features. The derived patterns comprise inputs of classification systems, which are based on statistical and machine learning pattern recognition techniques. Clustering methods are useful in detection of unknown attack patterns. Elimination of insignificant features is essential for a simplified, faster and more accurate detection of attacks. Genetic algorithm based clustering offers identification of significant reduced input features. We present a conceptual framework for identifying attacks for intrusion detection by applying genetic K-means algorithm.