2018
DOI: 10.25046/aj030160
|View full text |Cite
|
Sign up to set email alerts
|

An Analysis of K-means Algorithm Based Network Intrusion Detection System

Abstract: In this modern age, information technology (IT) plays a role in a number of different fields. And therefore, the role of security is very important to control and assist the flow of activities over the network. Intrusion detection (ID) is a kind of security management system for computers and networks. There are many approaches and methods used in ID. Each approach has merits and demerits. Therefore this paper highlights the similar distribution of attacks nature by using K-means and also the effective accurac… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 20 publications
(3 citation statements)
references
References 6 publications
0
3
0
Order By: Relevance
“…Since the K-means algorithm always converges, K-means can always reach a steady state in a finite number of steps, i.e., the clustering centres will not change again [14][15][16]. Since changes in the clustering centres often occur in the course of the previous iterations, in order to optimise the time complexity of the algorithm, the iterative process can usually be stopped and the results can be output directly when only more than 99% of the data points belong to clusters that no longer change.…”
Section: Clustering Analysis Of Student Behaviour Using the K-means A...mentioning
confidence: 99%
“…Since the K-means algorithm always converges, K-means can always reach a steady state in a finite number of steps, i.e., the clustering centres will not change again [14][15][16]. Since changes in the clustering centres often occur in the course of the previous iterations, in order to optimise the time complexity of the algorithm, the iterative process can usually be stopped and the results can be output directly when only more than 99% of the data points belong to clusters that no longer change.…”
Section: Clustering Analysis Of Student Behaviour Using the K-means A...mentioning
confidence: 99%
“…processing layers generated by multilayer perception mechanisms [3]. Computer vision [4], speech recognition [5], natural language processing [6], biomedicine [7], and malicious code detection [8], as well as several other fields, have been applied to deep learning. Studies on deep learning in network security have steadily appeared since 2015, drawing broad interest from academic circles.…”
Section: Local Outlier Factormentioning
confidence: 99%
“…Additionally, the two classical IDS implementation methods are Network Intrusion Detection Systems (NIDS) ( Mirsky et al, 2018 ) and Host-based IDS (HIDS) ( Aung & Min, 2018 ). A HIDS detection method monitors and detects internal attacks using the data from audit sources and host systems like firewall logs, database logs, application system audits, window server logs, and operating systems ( Khraisat et al, 2019 ).…”
Section: Introductionmentioning
confidence: 99%