The Research of Network Anomaly Detection Technology Based on Data Mining Article Swipe
YOU?
·
· 2015
· Open Access
·
· DOI: https://doi.org/10.2991/icecee-15.2015.319
With the rapid development of computer network, various problems also arise, especially the network security problem.How to quickly and efficiently find a variety of network intrusion behavior, to ensure the safety of the system and network resource is very important.Intrusion detection is a proactive safety protection technology, to take the initiative to monitor and track the invasion, to protect the computer system, network system, and the safety of the information infrastructure has very important practical significance.In this paper, in light of the characteristics of the network environment, this paper proposes a new network anomaly detection based on data mining technology, the method of clustering analysis in data mining to extension, raise the efficiency of intrusion detection system, guaranteeing the security of the network.
Related Topics
- Type
- article
- Language
- en
- Landing Page
- https://doi.org/10.2991/icecee-15.2015.319
- https://download.atlantis-press.com/article/24804.pdf
- OA Status
- hybrid
- References
- 2
- Related Works
- 10
- OpenAlex ID
- https://openalex.org/W1755510288
Raw OpenAlex JSON
- OpenAlex ID
-
https://openalex.org/W1755510288Canonical identifier for this work in OpenAlex
- DOI
-
https://doi.org/10.2991/icecee-15.2015.319Digital Object Identifier
- Title
-
The Research of Network Anomaly Detection Technology Based on Data MiningWork title
- Type
-
articleOpenAlex work type
- Language
-
enPrimary language
- Publication year
-
2015Year of publication
- Publication date
-
2015-01-01Full publication date if available
- Authors
-
Chunhong Wu, Wenzhong Xia, Fengyun LiuList of authors in order
- Landing page
-
https://doi.org/10.2991/icecee-15.2015.319Publisher landing page
- PDF URL
-
https://download.atlantis-press.com/article/24804.pdfDirect link to full text PDF
- Open access
-
YesWhether a free full text is available
- OA status
-
hybridOpen access status per OpenAlex
- OA URL
-
https://download.atlantis-press.com/article/24804.pdfDirect OA link when available
- Concepts
-
Anomaly detection, Anomaly (physics), Computer science, Data mining, Data science, Condensed matter physics, PhysicsTop concepts (fields/topics) attached by OpenAlex
- Cited by
-
0Total citation count in OpenAlex
- References (count)
-
2Number of works referenced by this work
- Related works (count)
-
10Other works algorithmically related by OpenAlex
Full payload
| id | https://openalex.org/W1755510288 |
|---|---|
| doi | https://doi.org/10.2991/icecee-15.2015.319 |
| ids.doi | https://doi.org/10.2991/icecee-15.2015.319 |
| ids.mag | 1755510288 |
| ids.openalex | https://openalex.org/W1755510288 |
| fwci | 0.0 |
| type | article |
| title | The Research of Network Anomaly Detection Technology Based on Data Mining |
| biblio.issue | |
| biblio.volume | |
| biblio.last_page | |
| biblio.first_page | |
| topics[0].id | https://openalex.org/T10400 |
| topics[0].field.id | https://openalex.org/fields/17 |
| topics[0].field.display_name | Computer Science |
| topics[0].score | 0.9638000130653381 |
| topics[0].domain.id | https://openalex.org/domains/3 |
| topics[0].domain.display_name | Physical Sciences |
| topics[0].subfield.id | https://openalex.org/subfields/1705 |
| topics[0].subfield.display_name | Computer Networks and Communications |
| topics[0].display_name | Network Security and Intrusion Detection |
| is_xpac | False |
| apc_list | |
| apc_paid | |
| concepts[0].id | https://openalex.org/C739882 |
| concepts[0].level | 2 |
| concepts[0].score | 0.7633520364761353 |
| concepts[0].wikidata | https://www.wikidata.org/wiki/Q3560506 |
| concepts[0].display_name | Anomaly detection |
| concepts[1].id | https://openalex.org/C12997251 |
| concepts[1].level | 2 |
| concepts[1].score | 0.6020300388336182 |
| concepts[1].wikidata | https://www.wikidata.org/wiki/Q567560 |
| concepts[1].display_name | Anomaly (physics) |
| concepts[2].id | https://openalex.org/C41008148 |
| concepts[2].level | 0 |
| concepts[2].score | 0.5984602570533752 |
| concepts[2].wikidata | https://www.wikidata.org/wiki/Q21198 |
| concepts[2].display_name | Computer science |
| concepts[3].id | https://openalex.org/C124101348 |
| concepts[3].level | 1 |
| concepts[3].score | 0.539142906665802 |
| concepts[3].wikidata | https://www.wikidata.org/wiki/Q172491 |
| concepts[3].display_name | Data mining |
| concepts[4].id | https://openalex.org/C2522767166 |
| concepts[4].level | 1 |
| concepts[4].score | 0.3438280522823334 |
| concepts[4].wikidata | https://www.wikidata.org/wiki/Q2374463 |
| concepts[4].display_name | Data science |
| concepts[5].id | https://openalex.org/C26873012 |
| concepts[5].level | 1 |
| concepts[5].score | 0.0 |
| concepts[5].wikidata | https://www.wikidata.org/wiki/Q214781 |
| concepts[5].display_name | Condensed matter physics |
| concepts[6].id | https://openalex.org/C121332964 |
| concepts[6].level | 0 |
| concepts[6].score | 0.0 |
| concepts[6].wikidata | https://www.wikidata.org/wiki/Q413 |
| concepts[6].display_name | Physics |
| keywords[0].id | https://openalex.org/keywords/anomaly-detection |
| keywords[0].score | 0.7633520364761353 |
| keywords[0].display_name | Anomaly detection |
| keywords[1].id | https://openalex.org/keywords/anomaly |
| keywords[1].score | 0.6020300388336182 |
| keywords[1].display_name | Anomaly (physics) |
| keywords[2].id | https://openalex.org/keywords/computer-science |
| keywords[2].score | 0.5984602570533752 |
| keywords[2].display_name | Computer science |
| keywords[3].id | https://openalex.org/keywords/data-mining |
| keywords[3].score | 0.539142906665802 |
| keywords[3].display_name | Data mining |
| keywords[4].id | https://openalex.org/keywords/data-science |
| keywords[4].score | 0.3438280522823334 |
| keywords[4].display_name | Data science |
| language | en |
| locations[0].id | doi:10.2991/icecee-15.2015.319 |
| locations[0].is_oa | True |
| locations[0].source.id | https://openalex.org/S4220651918 |
| locations[0].source.issn | 2352-538X, 2948-1961 |
| locations[0].source.type | book series |
| locations[0].source.is_oa | False |
| locations[0].source.issn_l | 2352-538X |
| locations[0].source.is_core | True |
| locations[0].source.is_in_doaj | False |
| locations[0].source.display_name | Advances in computer science research |
| locations[0].source.host_organization | https://openalex.org/P4310315540 |
| locations[0].source.host_organization_name | Atlantis Press |
| locations[0].source.host_organization_lineage | https://openalex.org/P4310315540 |
| locations[0].source.host_organization_lineage_names | Atlantis Press |
| locations[0].license | cc-by-nc |
| locations[0].pdf_url | https://download.atlantis-press.com/article/24804.pdf |
| locations[0].version | publishedVersion |
| locations[0].raw_type | proceedings-article |
| locations[0].license_id | https://openalex.org/licenses/cc-by-nc |
| locations[0].is_accepted | True |
| locations[0].is_published | True |
| locations[0].raw_source_name | Advances in Computer Science Research |
| locations[0].landing_page_url | https://doi.org/10.2991/icecee-15.2015.319 |
| indexed_in | crossref |
| authorships[0].author.id | https://openalex.org/A5100307677 |
| authorships[0].author.orcid | |
| authorships[0].author.display_name | Chunhong Wu |
| authorships[0].countries | CN |
| authorships[0].affiliations[0].institution_ids | https://openalex.org/I4210100300 |
| authorships[0].affiliations[0].raw_affiliation_string | Zhangjiakou Vocational College of Technology, Zhangjiakou 075000,China |
| authorships[0].institutions[0].id | https://openalex.org/I4210100300 |
| authorships[0].institutions[0].ror | https://ror.org/00mpsrh50 |
| authorships[0].institutions[0].type | facility |
| authorships[0].institutions[0].lineage | https://openalex.org/I4210100300 |
| authorships[0].institutions[0].country_code | CN |
| authorships[0].institutions[0].display_name | Zhangjiakou Academy of Agricultural Sciences |
| authorships[0].author_position | first |
| authorships[0].raw_author_name | Chunhong Wu |
| authorships[0].is_corresponding | False |
| authorships[0].raw_affiliation_strings | Zhangjiakou Vocational College of Technology, Zhangjiakou 075000,China |
| authorships[1].author.id | https://openalex.org/A5101142105 |
| authorships[1].author.orcid | |
| authorships[1].author.display_name | Wenzhong Xia |
| authorships[1].countries | CN |
| authorships[1].affiliations[0].institution_ids | https://openalex.org/I4210100300 |
| authorships[1].affiliations[0].raw_affiliation_string | Zhangjiakou Vocational College of Technology, Zhangjiakou 075000,China |
| authorships[1].institutions[0].id | https://openalex.org/I4210100300 |
| authorships[1].institutions[0].ror | https://ror.org/00mpsrh50 |
| authorships[1].institutions[0].type | facility |
| authorships[1].institutions[0].lineage | https://openalex.org/I4210100300 |
| authorships[1].institutions[0].country_code | CN |
| authorships[1].institutions[0].display_name | Zhangjiakou Academy of Agricultural Sciences |
| authorships[1].author_position | middle |
| authorships[1].raw_author_name | Wenzhong Xia |
| authorships[1].is_corresponding | False |
| authorships[1].raw_affiliation_strings | Zhangjiakou Vocational College of Technology, Zhangjiakou 075000,China |
| authorships[2].author.id | https://openalex.org/A5067905121 |
| authorships[2].author.orcid | https://orcid.org/0000-0002-2066-8492 |
| authorships[2].author.display_name | Fengyun Liu |
| authorships[2].countries | CN |
| authorships[2].affiliations[0].institution_ids | https://openalex.org/I4210100300 |
| authorships[2].affiliations[0].raw_affiliation_string | Zhangjiakou Vocational College of Technology, Zhangjiakou 075000,China |
| authorships[2].institutions[0].id | https://openalex.org/I4210100300 |
| authorships[2].institutions[0].ror | https://ror.org/00mpsrh50 |
| authorships[2].institutions[0].type | facility |
| authorships[2].institutions[0].lineage | https://openalex.org/I4210100300 |
| authorships[2].institutions[0].country_code | CN |
| authorships[2].institutions[0].display_name | Zhangjiakou Academy of Agricultural Sciences |
| authorships[2].author_position | last |
| authorships[2].raw_author_name | Fengyun Liu |
| authorships[2].is_corresponding | True |
| authorships[2].raw_affiliation_strings | Zhangjiakou Vocational College of Technology, Zhangjiakou 075000,China |
| has_content.pdf | True |
| has_content.grobid_xml | True |
| is_paratext | False |
| open_access.is_oa | True |
| open_access.oa_url | https://download.atlantis-press.com/article/24804.pdf |
| open_access.oa_status | hybrid |
| open_access.any_repository_has_fulltext | False |
| created_date | 2025-10-10T00:00:00 |
| display_name | The Research of Network Anomaly Detection Technology Based on Data Mining |
| has_fulltext | True |
| is_retracted | False |
| updated_date | 2025-11-06T03:46:38.306776 |
| primary_topic.id | https://openalex.org/T10400 |
| primary_topic.field.id | https://openalex.org/fields/17 |
| primary_topic.field.display_name | Computer Science |
| primary_topic.score | 0.9638000130653381 |
| primary_topic.domain.id | https://openalex.org/domains/3 |
| primary_topic.domain.display_name | Physical Sciences |
| primary_topic.subfield.id | https://openalex.org/subfields/1705 |
| primary_topic.subfield.display_name | Computer Networks and Communications |
| primary_topic.display_name | Network Security and Intrusion Detection |
| related_works | https://openalex.org/W2806741695, https://openalex.org/W3210364259, https://openalex.org/W4290647774, https://openalex.org/W3189286258, https://openalex.org/W3207797160, https://openalex.org/W2143820878, https://openalex.org/W2912112202, https://openalex.org/W2667207928, https://openalex.org/W4300558037, https://openalex.org/W4377864969 |
| cited_by_count | 0 |
| locations_count | 1 |
| best_oa_location.id | doi:10.2991/icecee-15.2015.319 |
| best_oa_location.is_oa | True |
| best_oa_location.source.id | https://openalex.org/S4220651918 |
| best_oa_location.source.issn | 2352-538X, 2948-1961 |
| best_oa_location.source.type | book series |
| best_oa_location.source.is_oa | False |
| best_oa_location.source.issn_l | 2352-538X |
| best_oa_location.source.is_core | True |
| best_oa_location.source.is_in_doaj | False |
| best_oa_location.source.display_name | Advances in computer science research |
| best_oa_location.source.host_organization | https://openalex.org/P4310315540 |
| best_oa_location.source.host_organization_name | Atlantis Press |
| best_oa_location.source.host_organization_lineage | https://openalex.org/P4310315540 |
| best_oa_location.source.host_organization_lineage_names | Atlantis Press |
| best_oa_location.license | cc-by-nc |
| best_oa_location.pdf_url | https://download.atlantis-press.com/article/24804.pdf |
| best_oa_location.version | publishedVersion |
| best_oa_location.raw_type | proceedings-article |
| best_oa_location.license_id | https://openalex.org/licenses/cc-by-nc |
| best_oa_location.is_accepted | True |
| best_oa_location.is_published | True |
| best_oa_location.raw_source_name | Advances in Computer Science Research |
| best_oa_location.landing_page_url | https://doi.org/10.2991/icecee-15.2015.319 |
| primary_location.id | doi:10.2991/icecee-15.2015.319 |
| primary_location.is_oa | True |
| primary_location.source.id | https://openalex.org/S4220651918 |
| primary_location.source.issn | 2352-538X, 2948-1961 |
| primary_location.source.type | book series |
| primary_location.source.is_oa | False |
| primary_location.source.issn_l | 2352-538X |
| primary_location.source.is_core | True |
| primary_location.source.is_in_doaj | False |
| primary_location.source.display_name | Advances in computer science research |
| primary_location.source.host_organization | https://openalex.org/P4310315540 |
| primary_location.source.host_organization_name | Atlantis Press |
| primary_location.source.host_organization_lineage | https://openalex.org/P4310315540 |
| primary_location.source.host_organization_lineage_names | Atlantis Press |
| primary_location.license | cc-by-nc |
| primary_location.pdf_url | https://download.atlantis-press.com/article/24804.pdf |
| primary_location.version | publishedVersion |
| primary_location.raw_type | proceedings-article |
| primary_location.license_id | https://openalex.org/licenses/cc-by-nc |
| primary_location.is_accepted | True |
| primary_location.is_published | True |
| primary_location.raw_source_name | Advances in Computer Science Research |
| primary_location.landing_page_url | https://doi.org/10.2991/icecee-15.2015.319 |
| publication_date | 2015-01-01 |
| publication_year | 2015 |
| referenced_works | https://openalex.org/W6702264789, https://openalex.org/W6732340749 |
| referenced_works_count | 2 |
| abstract_inverted_index.a | 21, 42, 90 |
| abstract_inverted_index.in | 78, 105 |
| abstract_inverted_index.is | 37, 41 |
| abstract_inverted_index.of | 4, 23, 31, 67, 80, 83, 102, 113, 120 |
| abstract_inverted_index.on | 96 |
| abstract_inverted_index.to | 16, 27, 47, 51, 57, 108 |
| abstract_inverted_index.and | 18, 34, 53, 64 |
| abstract_inverted_index.has | 71 |
| abstract_inverted_index.new | 91 |
| abstract_inverted_index.the | 1, 12, 29, 32, 49, 55, 59, 65, 68, 81, 84, 100, 111, 118, 121 |
| abstract_inverted_index.With | 0 |
| abstract_inverted_index.also | 9 |
| abstract_inverted_index.data | 97, 106 |
| abstract_inverted_index.find | 20 |
| abstract_inverted_index.take | 48 |
| abstract_inverted_index.this | 76, 87 |
| abstract_inverted_index.very | 38, 72 |
| abstract_inverted_index.based | 95 |
| abstract_inverted_index.light | 79 |
| abstract_inverted_index.paper | 88 |
| abstract_inverted_index.raise | 110 |
| abstract_inverted_index.rapid | 2 |
| abstract_inverted_index.track | 54 |
| abstract_inverted_index.arise, | 10 |
| abstract_inverted_index.ensure | 28 |
| abstract_inverted_index.method | 101 |
| abstract_inverted_index.mining | 98, 107 |
| abstract_inverted_index.paper, | 77 |
| abstract_inverted_index.safety | 30, 44, 66 |
| abstract_inverted_index.system | 33 |
| abstract_inverted_index.anomaly | 93 |
| abstract_inverted_index.monitor | 52 |
| abstract_inverted_index.network | 13, 24, 35, 62, 85, 92 |
| abstract_inverted_index.protect | 58 |
| abstract_inverted_index.quickly | 17 |
| abstract_inverted_index.system, | 61, 63, 116 |
| abstract_inverted_index.variety | 22 |
| abstract_inverted_index.various | 7 |
| abstract_inverted_index.analysis | 104 |
| abstract_inverted_index.computer | 5, 60 |
| abstract_inverted_index.network, | 6 |
| abstract_inverted_index.network. | 122 |
| abstract_inverted_index.problems | 8 |
| abstract_inverted_index.proposes | 89 |
| abstract_inverted_index.resource | 36 |
| abstract_inverted_index.security | 14, 119 |
| abstract_inverted_index.behavior, | 26 |
| abstract_inverted_index.detection | 40, 94, 115 |
| abstract_inverted_index.important | 73 |
| abstract_inverted_index.intrusion | 25, 114 |
| abstract_inverted_index.invasion, | 56 |
| abstract_inverted_index.practical | 74 |
| abstract_inverted_index.proactive | 43 |
| abstract_inverted_index.clustering | 103 |
| abstract_inverted_index.efficiency | 112 |
| abstract_inverted_index.especially | 11 |
| abstract_inverted_index.extension, | 109 |
| abstract_inverted_index.initiative | 50 |
| abstract_inverted_index.protection | 45 |
| abstract_inverted_index.development | 3 |
| abstract_inverted_index.efficiently | 19 |
| abstract_inverted_index.information | 69 |
| abstract_inverted_index.problem.How | 15 |
| abstract_inverted_index.technology, | 46, 99 |
| abstract_inverted_index.environment, | 86 |
| abstract_inverted_index.guaranteeing | 117 |
| abstract_inverted_index.infrastructure | 70 |
| abstract_inverted_index.characteristics | 82 |
| abstract_inverted_index.significance.In | 75 |
| abstract_inverted_index.important.Intrusion | 39 |
| cited_by_percentile_year | |
| corresponding_author_ids | https://openalex.org/A5067905121 |
| countries_distinct_count | 1 |
| institutions_distinct_count | 3 |
| corresponding_institution_ids | https://openalex.org/I4210100300 |
| sustainable_development_goals[0].id | https://metadata.un.org/sdg/9 |
| sustainable_development_goals[0].score | 0.6499999761581421 |
| sustainable_development_goals[0].display_name | Industry, innovation and infrastructure |
| citation_normalized_percentile.value | 0.04981056 |
| citation_normalized_percentile.is_in_top_1_percent | False |
| citation_normalized_percentile.is_in_top_10_percent | False |