Full text

Turn on search term navigation

Copyright © 2021 Yajing Wang et al. This is an open access article distributed under the Creative Commons Attribution License (the “License”), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. https://creativecommons.org/licenses/by/4.0/

Abstract

Intrusion detection is crucial in computer network security issues; therefore, this work is aimed at maximizing network security protection and its improvement by proposing various preventive techniques. Outlier detection and semisupervised clustering algorithms based on shared nearest neighbors are proposed in this work to address intrusion detection by converting it into a problem of mining outliers using the network behavior dataset. The algorithm uses shared nearest neighbors as similarity, judges whether it is an outlier according to the number of nearest neighbors of a data point, and performs semisupervised clustering on the dataset where outliers are deleted. In the process of semisupervised clustering, vast prior knowledge is added, and the dataset is clustered according to the principle of graph segmentation. The novelty of the proposed algorithm lies in outlier detection while effectively avoiding the dependence on parameters, thus eliminating the influence of outliers on clustering. This article uses real datasets: lypmphography and glass for simulation purposes. The simulation results show that the algorithm proposed in this paper can effectively detect outliers and has a good clustering effect. Furthermore, the experimentation reveals that the outlier detection-based SCA-SNN algorithm has the best practical effect on the dataset without outliers, clearly validating the clustering performance of the outlier detection-based SCA-SNN algorithm. Furthermore, compared to the other state-of-the-art anomaly detection method, it was revealed that the anomaly detection technology based on outlier mining does not require a training process. Thus, they overcome the current anomaly detection problems caused due to incomplete normal patterns in training samples.

Details

Title
An Exhaustive Research on the Application of Intrusion Detection Technology in Computer Network Security in Sensor Networks
Author
Wang, Yajing 1   VIAFID ORCID Logo  ; Ma, Juan 1   VIAFID ORCID Logo  ; Sharma, Ashutosh 2   VIAFID ORCID Logo  ; Singh, Pradeep Kumar 3   VIAFID ORCID Logo  ; Gurjot Singh Gaba 4   VIAFID ORCID Logo  ; Mehedi Masud 5   VIAFID ORCID Logo  ; Baz, Mohammed 6   VIAFID ORCID Logo 

 Internet of Things Technology Department, Shanxi Vocational &Technical College of Finance & Trade, Taiyuan, 030031 Shanxi, China 
 Institute of Computer Technology and Information Security, Southern Federal University, Russia 
 Department of CSE, ABES Engineering College, Ghaziabad, Uttar Pradesh, India 
 School of Electronics and Electrical Engineering, Lovely Professional University, Phagwara, Punjab 144411, India 
 Department of Computer Science, College of Computers and Information Technology, Taif University, P. O. Box 11099, Taif 21944, Saudi Arabia 
 Department of Computer Engineering, College of Computer and Information Technology, Taif University, PO Box. 11099, Taif 21994, Saudi Arabia 
Editor
Omprakash Kaiwartya
Publication year
2021
Publication date
2021
Publisher
John Wiley & Sons, Inc.
ISSN
1687725X
e-ISSN
16877268
Source type
Scholarly Journal
Language of publication
English
ProQuest document ID
2537373854
Copyright
Copyright © 2021 Yajing Wang et al. This is an open access article distributed under the Creative Commons Attribution License (the “License”), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. https://creativecommons.org/licenses/by/4.0/