Mining Network Security Logs via Fuzzy Clustering Algorithm
This paper concentrates on the problem of mining network security logs, which is very important to maintain the secure network environment. Firstly, we illustrate the structure of the network security logs mining system, which is made up of three modules: (1) data pre-processing module,
(2) pattern mining module and (3) pattern analysis module. Secondly, we define the vector of user session and user transaction. As fuzzy clustering may fall into local minima, we introduce the fuzzy particle swarm optimization to promote the performance of fuzzy clustering, and then we proposed
a hybrid fuzzy particle swarm optimization and fuzzy clustering to mining useful information from network security logs. Finally, we conduct experiments based on Iris dataset and IBM Power System S824L. Experimental results demonstrate that compared with HCM, FCM, and SFCM, our proposed algorithm
can achieve high clustering accuracy with lower time cost.
Keywords: Fuzzy Clustering; Fuzzy Particle Swarm Optimization; Membership Degree; Network Security Logs; Time Cost
Document Type: Research Article
Affiliations: Beijing Information Technology College, Beijing 100018, China
Publication date: 01 December 2015
- Journal of Computational and Theoretical Nanoscience is an international peer-reviewed journal with a wide-ranging coverage, consolidates research activities in all aspects of computational and theoretical nanoscience into a single reference source. This journal offers scientists and engineers peer-reviewed research papers in all aspects of computational and theoretical nanoscience and nanotechnology in chemistry, physics, materials science, engineering and biology to publish original full papers and timely state-of-the-art reviews and short communications encompassing the fundamental and applied research.
- Editorial Board
- Information for Authors
- Submit a Paper
- Subscribe to this Title
- Terms & Conditions
- Ingenta Connect is not responsible for the content or availability of external websites
- Access Key
- Free content
- Partial Free content
- New content
- Open access content
- Partial Open access content
- Subscribed content
- Partial Subscribed content
- Free trial content