2021
DOI: 10.1155/2021/5558860
|View full text |Cite
|
Sign up to set email alerts
|

An Exhaustive Research on the Application of Intrusion Detection Technology in Computer Network Security in Sensor Networks

Abstract: Intrusion detection is crucial in computer network security issues; therefore, this work is aimed at maximizing network security protection and its improvement by proposing various preventive techniques. Outlier detection and semisupervised clustering algorithms based on shared nearest neighbors are proposed in this work to address intrusion detection by converting it into a problem of mining outliers using the network behavior dataset. The algorithm uses shared nearest neighbors as similarity, judges whether … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
19
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
9

Relationship

2
7

Authors

Journals

citations
Cited by 39 publications
(26 citation statements)
references
References 36 publications
0
19
0
Order By: Relevance
“…A cluster message is defined as a symbol. A symbol refers to a group of messages that have the same format and role from the perspective of the protocol [3]. Alireza et al used the Needleman Wunsch algorithm for each symbol in the network to achieve ordering of common strings.…”
Section: Literature Reviewmentioning
confidence: 99%
“…A cluster message is defined as a symbol. A symbol refers to a group of messages that have the same format and role from the perspective of the protocol [3]. Alireza et al used the Needleman Wunsch algorithm for each symbol in the network to achieve ordering of common strings.…”
Section: Literature Reviewmentioning
confidence: 99%
“…The use of cloud computing in computer applications can provide users with a large number of network resources. Computer users can obtain cloud resources anytime and anywhere through computing technology so that each computer user can enjoy the massive information resources and data information in the network [ 1 ]. The main manifestations of the new age of science and technology are cloud computing, big data technology, and artificial intelligence.…”
Section: Introductionmentioning
confidence: 99%
“…A feature vector has been generated from the preprocessed image using fuzzy clustering approach [38][39][40][41][42]. It is an unsupervised learning method that identifies the similarity of pixel values without knowing the attribute label used in the cluster overlapping of the image pixel [43][44][45][46][47][48].…”
Section: Feature Extraction Fuzzy Clustering (Fuzzy C Means)mentioning
confidence: 99%