2015
DOI: 10.1155/2015/491910
|View full text |Cite
|
Sign up to set email alerts
|

LKM: A LDA-BasedK-Means Clustering Algorithm for Data Analysis of Intrusion Detection in Mobile Sensor Networks

Abstract: Mobile sensor networks (MSNs), consisting of mobile nodes, are sensitive to network attacks. Intrusion detection system (IDS) is a kind of active network security technology to protect network from attacks. In the data gathering phase of IDS, due to the high-dimension data collected in multidimension space, great pressure has been put on the subsequent data analysis and response phase. Therefore, traditional methods for intrusion detection can no longer be applicable in MSNs. To improve the performance of data… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2015
2015
2020
2020

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 18 publications
0
4
0
Order By: Relevance
“…First, character features were converted into digital features, and finally 41 features were converted into 122 digital features. Then, in order to eliminate the problem of too large numerical span between different data, the average variance method [14] was used for standard operation of data:…”
Section: Experimental Stepsmentioning
confidence: 99%
“…First, character features were converted into digital features, and finally 41 features were converted into 122 digital features. Then, in order to eliminate the problem of too large numerical span between different data, the average variance method [14] was used for standard operation of data:…”
Section: Experimental Stepsmentioning
confidence: 99%
“…This algorithm uses the particle swarm optimisation K‐means clustering algorithm to generate a detection model to detect if the user behaviour is abnormal or not. In [11], the author proposed a linear discriminant analysis (LDA)‐based K‐means clustering algorithm. Firstly, the author uses LDA dimension reduction to classify high‐dimensional datasets into two‐dimensional datasets.…”
Section: Related Workmentioning
confidence: 99%
“…IDS detects whether there is an attack behavior in the network and immediately performs response processing. Recently, a large number of techniques are applied to intrusion detection, such as rule-based network intrusion detection technology [8], artificial immune system [9], clustering-based technology [10,11], Support Vector Machine (SVM) [12,13], neural network [14][15][16], etc. Currently, among many intrusion detection algorithms, neural network-related algorithms have been widely used because of their good robustness and adaptability.…”
Section: Introductionmentioning
confidence: 99%