Research on the application of DT and K-NN-based data mining algorithms in network intrusion monitoring

With the rapid development of computer Internet technology, network communication has become an important way to obtain information. However, the open Internet is also vulnerable to all kinds of malicious damage and attacks. Intrusion monitoring technology can realize the monitoring, analysis and de...

Full description

Saved in:
Bibliographic Details
Main Author Li, Shaoxi
Format Conference Proceeding
LanguageEnglish
Published SPIE 26.10.2023
Online AccessGet full text
ISBN9781510671423
1510671420
ISSN0277-786X
DOI10.1117/12.3009151

Cover

Abstract With the rapid development of computer Internet technology, network communication has become an important way to obtain information. However, the open Internet is also vulnerable to all kinds of malicious damage and attacks. Intrusion monitoring technology can realize the monitoring, analysis and defense of intrusion behaviors, but the current intrusion monitoring technology cannot meet the development needs of current network security. The study adopts decision tree algorithm for information classification model design and combines k proximity algorithm to construct network intrusion classification model design. The experimental results show that the decision tree-k proximity algorithm has the highest correct detection rate, with a maximum accuracy of 94.36% and strong monitoring capability; the training time of the model is short, taking only 5 s when the training is completed; at the same time, the recall rate of the decision tree-k proximity algorithm is high, and the area enclosed by the subject's characteristic curve is large, with better comprehensive performance. The data mining network intrusion monitoring model based on decision tree and k proximity algorithm can accurately monitor malicious attacks and ensure system security, which is important for maintaining computer network security.
AbstractList With the rapid development of computer Internet technology, network communication has become an important way to obtain information. However, the open Internet is also vulnerable to all kinds of malicious damage and attacks. Intrusion monitoring technology can realize the monitoring, analysis and defense of intrusion behaviors, but the current intrusion monitoring technology cannot meet the development needs of current network security. The study adopts decision tree algorithm for information classification model design and combines k proximity algorithm to construct network intrusion classification model design. The experimental results show that the decision tree-k proximity algorithm has the highest correct detection rate, with a maximum accuracy of 94.36% and strong monitoring capability; the training time of the model is short, taking only 5 s when the training is completed; at the same time, the recall rate of the decision tree-k proximity algorithm is high, and the area enclosed by the subject's characteristic curve is large, with better comprehensive performance. The data mining network intrusion monitoring model based on decision tree and k proximity algorithm can accurately monitor malicious attacks and ensure system security, which is important for maintaining computer network security.
Author Li, Shaoxi
Author_xml – sequence: 1
  givenname: Shaoxi
  surname: Li
  fullname: Li, Shaoxi
  organization: Guangdong University of Science and Technology (China)
BookMark eNotkEtPwzAQhC1RJNrSC7_AZ6QUr03i5IjKU1RFgh64RX5sUkNrR7ERfx9X9LTfSquZ2ZmRiQ8eCbkCtgQAeQN8KRhroIQzsmhknYFVEm65mJAp41IWsq4-L8gsxi_GeF3KZkr6d4yoRrOjwdO0Q6qGYe-MSi7voaP3W6q8pa_FZlNoFdFSq5KiB-ed76na92F0aXeI1HnqMf2G8TtjGn_iUeAQvEv5wveX5LxT-4iL05yTj8eH7eq5WL89vazu1kUEVkIhOmaE5iV2leY5rhBSA9SdQl0bZivZYH4xgzJVWZZco4aaWQTLDavFnFz_q8bBYTuMwSDa7B5bYO2xpBZ4eypJ_AFaDls_
ContentType Conference Proceeding
Copyright COPYRIGHT SPIE. Downloading of the abstract is permitted for personal use only.
Copyright_xml – notice: COPYRIGHT SPIE. Downloading of the abstract is permitted for personal use only.
DOI 10.1117/12.3009151
DatabaseTitleList
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
Editor Qu, Xilong
Editor_xml – sequence: 1
  givenname: Xilong
  surname: Qu
  fullname: Qu, Xilong
  organization: Hunan Univ. of Finance and Economics (China)
EndPage 129222P-8
ExternalDocumentID 10_1117_12_3009151
GroupedDBID 29O
4.4
5SJ
ACGFS
ALMA_UNASSIGNED_HOLDINGS
EBS
F5P
FQ0
R.2
RNS
RSJ
SPBNH
UT2
ID FETCH-LOGICAL-s1051-3f0c3b25ef6b2786337b118faeb8c0d679e0090d6ac65552beb180de1d2c083
ISBN 9781510671423
1510671420
ISSN 0277-786X
IngestDate Sun Oct 29 04:18:27 EDT 2023
IsPeerReviewed false
IsScholarly true
Language English
LinkModel OpenURL
MergedId FETCHMERGED-LOGICAL-s1051-3f0c3b25ef6b2786337b118faeb8c0d679e0090d6ac65552beb180de1d2c083
Notes Conference Date: 2023-08-11|2023-08-13
Conference Location: Xiamen, China
ParticipantIDs spie_proceedings_10_1117_12_3009151
PublicationCentury 2000
PublicationDate 20231026
PublicationDateYYYYMMDD 2023-10-26
PublicationDate_xml – month: 10
  year: 2023
  text: 20231026
  day: 26
PublicationDecade 2020
PublicationYear 2023
Publisher SPIE
Publisher_xml – name: SPIE
SSID ssj0028579
Score 2.238379
Snippet With the rapid development of computer Internet technology, network communication has become an important way to obtain information. However, the open Internet...
SourceID spie
SourceType Publisher
StartPage 129222P
Title Research on the application of DT and K-NN-based data mining algorithms in network intrusion monitoring
URI http://www.dx.doi.org/10.1117/12.3009151
Volume 12922
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1bT4MwFG50vuiT13hPE30jKBTK5dE4zbxsMdlMfFsoLbrEgdlmYvz1npZCme5BfSGsIUD7sXO-057vFKFTnztxmsaxLYul2T7nLthBlUUYpn6WBTymUjvc7QWdR__2iT6ZvfmUumTGztLPhbqS_6AKbYCrVMn-Adn6ptAA54AvHAFhOH4jvwv9TJU1pyf8rcZitOSA7YFaGbizez1bOituyXRQa6y2hLCS1-diMpq9jFVCbF5mg8vqEZN3OYFmjdWffVI9UebsqIX__ktSfIyakwVEpZ2VinSdYnEzH0CCvwd35fql5lfbHbmqG0Zqg0FjJElc6oe1oVO_yUPDb-oWNfiLDLOS9pMzD0idq2vMzhe6LsORcOiSob5oGS2HIZiqlYt2975fx9ERLUsoVu8p9XpVP6oyXnW_dElauPG5ebpM23sbiQaTGKyjbaOxxA81qhtoSeSbaK1RHnILPVcA4yLHADBuAIyLDLcHGADGBmAsAcYlwNgAjEc51gDjGmBsAN5G_eurwWXH1htj2FOgw67tZU7qMUJFFjACI-B5IYNAMUsEi1KHB2EsoJ9wkqQBpZQwcMiRw4XLSQqUewe18iIXuwhHgStoAiSNAkuJ_USqnLmMSZlwGOHRHjqR4zQ0H_l0-BOm_V9ddYBWzRd5iFrQW3EEhG7GjjXAX2r-QQY
linkProvider EBSCOhost
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=Research+on+the+application+of+DT+and+K-NN-based+data+mining+algorithms+in+network+intrusion+monitoring&rft.au=Li%2C+Shaoxi&rft.date=2023-10-26&rft.pub=SPIE&rft.isbn=9781510671423&rft.issn=0277-786X&rft.volume=12922&rft.spage=129222P&rft.epage=129222P-8&rft_id=info:doi/10.1117%2F12.3009151&rft.externalDocID=10_1117_12_3009151
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0277-786X&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0277-786X&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0277-786X&client=summon