Research for the arithmetic of cloud computing intrusion detection
Research for the arithmetic of cloud computing intrusion detection
- Author(s): Xueting Han and Yuexi Chen
- DOI: 10.1049/cp.2015.0844
For access to this article, please select a purchase option:
Buy conference paper PDF
Buy Knowledge Pack
IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.
Third International Conference on Cyberspace Technology (CCT 2015) — Recommend this title to your library
Thank you
Your recommendation has been sent to your librarian.
- Author(s): Xueting Han and Yuexi Chen Source: Third International Conference on Cyberspace Technology (CCT 2015), 2015 page ()
- Conference: Third International Conference on Cyberspace Technology (CCT 2015)
- DOI: 10.1049/cp.2015.0844
- ISBN: 978-1-78561-089-9
- Location: Beijing, China
- Conference date: 17-18 Oct. 2015
- Format: PDF
The cloud computing security is very important. The intrusion detection method based on clustering has become one of the main research methods in intrusion detection at present stage. The intrusion detection system model of cloud environment is put forward. FCM clustering algorithm also has been widely used in the field of intrusion detection. However, FCM algorithm of intrusion detection in a cloud environment has some questions. For this defect of Fuzzy C-means clustering algorithm, the improved algorithm based on sample contribution is put forward.
Inspec keywords: security of data; cloud computing; pattern clustering; fuzzy set theory
Subjects: Combinatorial mathematics; Data security; Internet software
Related content
content/conferences/10.1049/cp.2015.0844
pub_keyword,iet_inspecKeyword,pub_concept
6
6