“…To overcome the threat of increasing network intrusion, a number of methods with respect to the anomaly network traffic detection have been developed, including principal component analysis, wavelet analysis, Markov model, clustering, histogram, sketch [1] and neural network [2]. Therefore, the arguably most efficient method is clustering, where over 100 anomaly detection studies based on self-organizing mapping (SOM) have been carried out since 2000 [3], including G-SOM [4], GHSOM [5], DBGSOM [6], SE-DBGSOM [7], SE-DBGHSOM [8]. However, these models use either the quantization error or the Euclidean distance of data vectors to determine neuron growth, which may come across the challenge of inaccurate data clustering.…”