JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE) ›› 2012, Vol. 42 ›› Issue (5): 41-46.

• Articles • Previous Articles     Next Articles

Research on intrusion detection algorithm based on PCA and semisupervised clustering

DING Yan, LI Yong-zhong*   

  1. School of Computer Science and Engineering, Jiangsu University of Science and Technology, Zhenjiang 212003, China
  • Received:2012-05-06 Online:2012-10-20 Published:2012-05-06

Abstract: In order to solve the problem that lots of redundant information existed in network intrusion detection data and the traditional clustering algorithms were inadequate for detecting outlier, an intrusion detection algorithm based on principal component analysis(PCA) and semisupervised clustering was proposed. First, the features of data were extracted by using PCA, and the redundant attributes among the data were eliminated. Then, a few labeled samples and pairwise constraints information were exploited, and competitive agglomeration was introduced to letting the system active learning in order that the detection of lots of unknown samples could be realized. The experimental results on intrusion detection data set and UCI benchmark data sets showed that this algorithm could effectively improve the system performance.

Key words: intrusion detection, principal component analysis (PCA), semisupervised clustering, pairwise constraints, competitive agglomeration

CLC Number: 

  • TP393.08
[1] Caihui LIU,Qi ZHOU,Xiaowen YE. An intrusion detection model based on improved ReliefF algorithm [J]. Journal of Shandong University(Engineering Science), 2023, 53(2): 1-10.
[2] XIE Ziqi, WANG Lihong, LI Man. Active learning of pairwise constraints in block diagonal subspace clustering [J]. Journal of Shandong University(Engineering Science), 2021, 51(2): 65-73.
[3] Haijun ZHANG,Yinghui CHEN. Semantic analysis and vectorization for intelligent detection of big data cross-site scripting attacks [J]. Journal of Shandong University(Engineering Science), 2020, 50(2): 118-128.
[4] XIAO Miaomiao, WEI Benzheng, YIN Yilong. A hybrid intrusion detection system based on BFOA and K-means algorithm [J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2018, 48(3): 115-119.
[5] LI Chun-yan, LIU Yi-liang, WANG Liang-min*. Intrusion detection scheme based on traffic scenarios in vehicular adhoc networks [J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2014, 44(1): 29-34.
[6] WANG Hao, HUA Ji-xue, FAN Xiao-shi. Intrusion detection technology based on twin support vector machine [J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2013, 43(6): 53-56.
[7] XIA Zhan-guo, WAN Ling, CAI Shi-yu, SUN Peng-hui. A semi-supervised clustering algorithm oriented to intrusion detection [J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2012, 42(6): 1-7.
[8] ZHANG You-xin, WANG Li-hong. Two-stage semi-supervised clustering algorithm based on affinity propagation [J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2012, 42(2): 18-22.
[9] LIU Yuan-xun,XU Qiu-liang,YUN Xiao-chun . Research on IDS-faced general-purpose application-level protocol identification technology [J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2007, 37(1): 65-69 .
[10] GAO Xiao-wei,JIANG Xiao-yun . [J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2006, 36(6): 107-110 .
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
[1] ZHANG Yong-hua,WANG An-ling,LIU Fu-ping . The reflected phase angle of low frequent inhomogeneous[J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2006, 36(2): 22 -25 .
[2] SHI Lai-shun,WAN Zhong-yi . Synthesis and performance evaluation of a novel betaine-type asphalt emulsifier[J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2008, 38(4): 112 -115 .
[3] KONG Xiang-zhen,LIU Yan-jun,WANG Yong,ZHAO Xiu-hua . Compensation and simulation for the deadband of the pneumatic proportional valve[J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2006, 36(1): 99 -102 .
[4] LAI Xiang . The global domain of attraction for a kind of MKdV equations[J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2006, 36(1): 87 -92 .
[5] YU Jia yuan1, TIAN Jin ting1, ZHU Qiang zhong2. Computational intelligence and its application in psychology[J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2009, 39(1): 1 -5 .
[6] JI Tao,GAO Xu/sup>,SUN Tong-jing,XUE Yong-duan/sup>,XU Bing-yin/sup> . Characteristic analysis of fault generated traveling waves in 10 Kv automatic blocking and continuous power transmission lines[J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2006, 36(2): 111 -116 .
[7] QIN Tong, SUN Fengrong*, WANG Limei, WANG Qinghao, LI Xincai. 3D surface reconstruction using the shape based interpolation guided by maximal discs[J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2010, 40(3): 1 -5 .
[8] WANG Jing,LI Yu-jiang,ZHANG Xiao-jin,BI Yan-jun,CHEN Wei-suo . [J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2006, 36(6): 100 -103 .
[9] SUN Dianzhu, ZHU Changzhi, LI Yanrui. [J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2009, 39(1): 84 -86 .
[10] SUN Cong-zheng,GUAN Cong-sheng,QIN Jing-yu,CHENG Chuan . The structure and performances of the electroless Ni-P alloy coating on aluminum alloy[J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2007, 37(5): 108 -112 .