Education, Science, Technology, Innovation and Life
Open Access
Sign In

Application of clustering analysis in Intrusion Detection

Download as PDF

DOI: 10.23977/ieps.2017.1021

Author(s)

Zhang Yifan, Li Xingshan, Xu Min

Corresponding Author

Li Xingshan

ABSTRACT

Clustering technology and boundary point detection technology and its application in intrusion detection system are introduced in this paper from three aspects, which are the application of clustering analysis, boundary detection and clustering analysis in Intrusion Detection System. The data processing and the requirement of clustering algorithm for intrusion detection system are introduced in detail. Analyzed the result of the experiment environment and experiment, further validation of this project is based on the improved NPRIM algorithm applied to intrusion detection is effective and feasible.

KEYWORDS

Cluster, Analysis Techniques, Boundary Detection, Intrusion Detection

All published work is licensed under a Creative Commons Attribution 4.0 International License.

Copyright © 2016 - 2031 Clausius Scientific Press Inc. All Rights Reserved.