DBSCAN Clustering Algorithm Based on Big Data Is Applied in Network Information Security Detection

In order to improve the certainty and clarity of information security detection, an application method of big data clustering algorithm in information security detection is proposed. The experimental results show that when the amount of data is close to 6000, the efficiency of the improved algorithm...

Celý popis

Uloženo v:
Podrobná bibliografie
Vydáno v:Security and communication networks Ročník 2022; s. 1 - 8
Hlavní autor: Zhang, Yan
Médium: Journal Article
Jazyk:angličtina
Vydáno: London Hindawi 12.07.2022
John Wiley & Sons, Inc
Témata:
ISSN:1939-0114, 1939-0122
On-line přístup:Získat plný text
Tagy: Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
Abstract In order to improve the certainty and clarity of information security detection, an application method of big data clustering algorithm in information security detection is proposed. The experimental results show that when the amount of data is close to 6000, the efficiency of the improved algorithm is nearly 70% higher than that of DBSCAN, and it is still very close to the efficiency of the BIRCH algorithm. The algorithm has a high processing speed for large-scale data sets without increasing the time complexity and can also accurately cluster clusters of any shape. When the data set increases from 9000 rows to 58000 rows, in turn, the time-consuming of the traditional DBSCAN algorithm increases sharply, while the time-consuming of the improved DBSCAN algorithm is still stable, and the time-consuming gap between the two is getting bigger and bigger. At the same time, the algorithm adopts a heuristic adaptive algorithm to estimate some threshold parameters of the clustering algorithm, which can avoid the direct setting of the threshold parameters by the user and can effectively estimate the relevant threshold parameters, extract clusters of any shape, and the clustering effect is obvious.
AbstractList In order to improve the certainty and clarity of information security detection, an application method of big data clustering algorithm in information security detection is proposed. The experimental results show that when the amount of data is close to 6000, the efficiency of the improved algorithm is nearly 70% higher than that of DBSCAN, and it is still very close to the efficiency of the BIRCH algorithm. The algorithm has a high processing speed for large-scale data sets without increasing the time complexity and can also accurately cluster clusters of any shape. When the data set increases from 9000 rows to 58000 rows, in turn, the time-consuming of the traditional DBSCAN algorithm increases sharply, while the time-consuming of the improved DBSCAN algorithm is still stable, and the time-consuming gap between the two is getting bigger and bigger. At the same time, the algorithm adopts a heuristic adaptive algorithm to estimate some threshold parameters of the clustering algorithm, which can avoid the direct setting of the threshold parameters by the user and can effectively estimate the relevant threshold parameters, extract clusters of any shape, and the clustering effect is obvious.
Author Zhang, Yan
Author_xml – sequence: 1
  givenname: Yan
  orcidid: 0000-0002-9501-7897
  surname: Zhang
  fullname: Zhang, Yan
  organization: Department of Information EngineeringShiJiaZhuang University of Applied TechnologyShijiazhuang 050081HebeiChina
BookMark eNp9kMtOwzAQRS1UJNrCjg-wxBJC_crDyzTlUQmVRWEdOY7TuqRxsB1V_XtSWrFAgtWMZs6dq7kjMGhMowC4xuge4zCcEETIhPMQR4ifgSHmlAcIEzL46TG7ACPnNghFmMVsCIrZdJmlC5jVnfPK6mYF03plrPbrLZwKp0poGjjVKzgTXsC5g2nb1rof6wYulN8Z-wHnTWXsVnjdo0slu169hzPllTyMLsF5JWqnrk51DN4fH96y5-Dl9WmepS-BpDT2gYolK2NScFoxwgUpi5AUCSnKWFacEkVEv-BcCRayKi5lQkqGJCUiFEnEk4SOwc3xbmvNZ6eczzems01vmZOI0zDGLOQ9dXekpDXOWVXlrdVbYfc5RvkhxfyQYn5KscfJL1xq__2pt0LXf4luj6K1bkqx0_9bfAHJ1IJv
CitedBy_id crossref_primary_10_46481_jnsps_2023_1364
crossref_primary_10_1109_ACCESS_2024_3525342
crossref_primary_10_1155_2023_9837526
Cites_doi 10.1021/acsomega.0c05758
10.1055/a-1556-0210
10.1007/s42114-021-00229-w
10.1007/s40964-021-00172-8
10.1007/s10668-021-01810-5
10.1007/s13198-021-01094-y
10.1007/s10257-021-00538-z
10.1016/j.jbspin.2019.09.001
10.1155/2021/5814879
10.1088/1742-6596/1942/1/012033
10.3390/ijerph17030748
10.1016/j.eswa.2020.113361
10.1088/1742-6596/1918/4/042032
10.1049/cim2.12029
10.1109/tii.2019.2927349
10.1088/1742-6596/1757/1/012105
10.1038/s41591-019-0725-7
10.1088/1742-6596/1744/3/032065
10.1007/s13349-020-00386-4
10.1007/s00500-021-06536-0
10.3390/s21165429
10.1016/j.asoc.2021.107171
10.1053/j.jvca.2019.11.012
ContentType Journal Article
Copyright Copyright © 2022 Yan Zhang.
Copyright © 2022 Yan Zhang. This is an open access article distributed under the Creative Commons Attribution License (the “License”), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. https://creativecommons.org/licenses/by/4.0
Copyright_xml – notice: Copyright © 2022 Yan Zhang.
– notice: Copyright © 2022 Yan Zhang. This is an open access article distributed under the Creative Commons Attribution License (the “License”), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. https://creativecommons.org/licenses/by/4.0
DBID RHU
RHW
RHX
AAYXX
CITATION
7SC
7SP
8FD
JQ2
L7M
L~C
L~D
DOI 10.1155/2022/9951609
DatabaseName Hindawi Publishing Complete
Hindawi Publishing Subscription Journals
Hindawi Publishing Open Access
CrossRef
Computer and Information Systems Abstracts
Electronics & Communications Abstracts
Technology Research Database
ProQuest Computer Science Collection
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
DatabaseTitle CrossRef
Technology Research Database
Computer and Information Systems Abstracts – Academic
Electronics & Communications Abstracts
ProQuest Computer Science Collection
Computer and Information Systems Abstracts
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts Professional
DatabaseTitleList
CrossRef
Technology Research Database
Database_xml – sequence: 1
  dbid: RHX
  name: Hindawi Publishing Open Access
  url: http://www.hindawi.com/journals/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISSN 1939-0122
Editor Soni, Mukesh
Editor_xml – sequence: 1
  givenname: Mukesh
  surname: Soni
  fullname: Soni, Mukesh
EndPage 8
ExternalDocumentID 10_1155_2022_9951609
GroupedDBID .4S
.DC
05W
0R~
123
1OC
3SF
4.4
52U
5DZ
66C
8-1
8UM
AAESR
AAFWJ
AAJEY
AAONW
ACGFO
ADBBV
ADIZJ
AENEX
AFBPY
AFKRA
AJXKR
ALMA_UNASSIGNED_HOLDINGS
ARAPS
ARCSS
ATUGU
AZVAB
BCNDV
BENPR
BGLVJ
BHBCM
BNHUX
BOGZA
BRXPI
CCPQU
CS3
DR2
DU5
EBS
EIS
F1Z
G-S
GROUPED_DOAJ
HCIFZ
HZ~
IAO
ICD
ITC
IX1
K7-
LITHE
MY.
MY~
NNB
O9-
OIG
OK1
P2P
PIMPY
RHU
RHW
RHX
TH9
TUS
W99
WBKPD
XV2
24P
AAMMB
AAYXX
ACCMX
ADMLS
AEFGJ
AGXDD
AIDQK
AIDYY
ALUQN
CITATION
H13
7SC
7SP
8FD
JQ2
L7M
L~C
L~D
ID FETCH-LOGICAL-c337t-e7c4d72b93f429a2db52b82bd7cf932e2a3f499ea454f7dc82d40c32a5a869883
IEDL.DBID RHX
ISICitedReferencesCount 4
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000881348500008&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
ISSN 1939-0114
IngestDate Fri Jul 25 20:53:17 EDT 2025
Tue Nov 18 22:04:20 EST 2025
Sat Nov 29 02:59:40 EST 2025
Sun Jun 02 18:53:02 EDT 2024
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Language English
License This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
https://creativecommons.org/licenses/by/4.0
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c337t-e7c4d72b93f429a2db52b82bd7cf932e2a3f499ea454f7dc82d40c32a5a869883
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ORCID 0000-0002-9501-7897
OpenAccessLink https://dx.doi.org/10.1155/2022/9951609
PQID 2693571459
PQPubID 1046363
PageCount 8
ParticipantIDs proquest_journals_2693571459
crossref_primary_10_1155_2022_9951609
crossref_citationtrail_10_1155_2022_9951609
hindawi_primary_10_1155_2022_9951609
PublicationCentury 2000
PublicationDate 2022-07-12
PublicationDateYYYYMMDD 2022-07-12
PublicationDate_xml – month: 07
  year: 2022
  text: 2022-07-12
  day: 12
PublicationDecade 2020
PublicationPlace London
PublicationPlace_xml – name: London
PublicationTitle Security and communication networks
PublicationYear 2022
Publisher Hindawi
John Wiley & Sons, Inc
Publisher_xml – name: Hindawi
– name: John Wiley & Sons, Inc
References 22
23
25
26
10
11
X. Liu (24) 2015; 13
12
13
15
17
18
19
J. Frcpc (14) 2020; 37
D. Lieharyani (9) 2020; 1175
1
B. Jka (16) 2020; 87
2
3
4
5
6
7
8
20
21
References_xml – ident: 19
  doi: 10.1021/acsomega.0c05758
– ident: 2
  doi: 10.1055/a-1556-0210
– ident: 6
  doi: 10.1007/s42114-021-00229-w
– ident: 8
  doi: 10.1007/s40964-021-00172-8
– volume: 1175
  start-page: 7
  year: 2020
  ident: 9
  article-title: Assessment for good university governance in higher education focus on align strategy business with it at big data era
  publication-title: Journal of Physics: Conference Series
– ident: 23
  doi: 10.1007/s10668-021-01810-5
– ident: 21
  doi: 10.1007/s13198-021-01094-y
– ident: 1
  doi: 10.1007/s10257-021-00538-z
– volume: 87
  start-page: 107
  issue: 2
  year: 2020
  ident: 16
  article-title: Big data and artificial intelligence: will they change our practice?
  publication-title: Joint Bone Spine
  doi: 10.1016/j.jbspin.2019.09.001
– ident: 26
  doi: 10.1155/2021/5814879
– ident: 3
  doi: 10.1088/1742-6596/1942/1/012033
– ident: 10
  doi: 10.3390/ijerph17030748
– ident: 11
  doi: 10.1016/j.eswa.2020.113361
– ident: 18
  doi: 10.1088/1742-6596/1918/4/042032
– ident: 25
  doi: 10.1049/cim2.12029
– ident: 12
  doi: 10.1109/tii.2019.2927349
– ident: 5
  doi: 10.1088/1742-6596/1757/1/012105
– ident: 17
  doi: 10.1038/s41591-019-0725-7
– ident: 4
  doi: 10.1088/1742-6596/1744/3/032065
– volume: 37
  start-page: 11
  issue: 1
  year: 2020
  ident: 14
  article-title: Big data for a big problem: how can we enhance the implementation of perioperative cardiovascular guidelines sciencedirect
  publication-title: Canadian Journal of Cardiology
– volume: 13
  start-page: 480
  issue: 06
  year: 2015
  ident: 24
  article-title: Power station flue gas desulfurization system based on automatic online monitoring platform
  publication-title: Journal of Digital Information Management
– ident: 15
  doi: 10.1007/s13349-020-00386-4
– ident: 20
  doi: 10.1007/s00500-021-06536-0
– ident: 7
  doi: 10.3390/s21165429
– ident: 22
  doi: 10.1016/j.asoc.2021.107171
– ident: 13
  doi: 10.1053/j.jvca.2019.11.012
SSID ssj0061474
Score 2.3103356
Snippet In order to improve the certainty and clarity of information security detection, an application method of big data clustering algorithm in information security...
SourceID proquest
crossref
hindawi
SourceType Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 1
SubjectTerms Adaptive algorithms
Algorithms
Big Data
Cluster analysis
Clustering
Computer networks
Data mining
Datasets
Efficiency
Information industry
Internet
Methods
Network security
Parameter estimation
Parameters
Security
Shape effects
Title DBSCAN Clustering Algorithm Based on Big Data Is Applied in Network Information Security Detection
URI https://dx.doi.org/10.1155/2022/9951609
https://www.proquest.com/docview/2693571459
Volume 2022
WOSCitedRecordID wos000881348500008&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVWIB
  databaseName: Wiley-Blackwell Open Access Collection
  customDbUrl:
  eissn: 1939-0122
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0061474
  issn: 1939-0114
  databaseCode: 24P
  dateStart: 20170101
  isFulltext: true
  titleUrlDefault: https://authorservices.wiley.com/open-science/open-access/browse-journals.html
  providerName: Wiley-Blackwell
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3dS8MwEA86FPRB_MTpHHmYT1Jc87Ekj_twTJAxnMLeStqm22B2snb673vpMlGH6GPTSx_ukvvdr7m7IFSjPk_A90qP1g0QlDCknlSJ8hIjAa91ollcFAo_iH5fjkZq4JokZZtH-IB2lp6TWwWRQMMW6m1LbhfvY2-0drgAMMIdHtvUH5-t89t_zP2GPLsTS3nfpxsuuMCV7iE6cAEhbq4seIS2THqM9r-0CTxBYac1bDf7uD1b2rYGMIabs_EcaP3kBbcAhmI8T3FrOsYdnWt8n2EXW-JpivurPG_s6o6sHfDQXVqHOyYvUrHSU_TcvXtq9zx3N4IXUSpyz4iIxYKEiiaAKJrEISehJGEsogRCMkM0vFDKaMZZIuJIkpjVI0o017KhpKRnqJTOU3OOsGYaNOjDzpXAxZQIFRDseiRhAgQXDVZGN2u9BZFrHG7vr5gFBYHgPLBaDpyWy-j6U_p11TDjF7maM8EfYpW1fQK3u7KANBTlwmdcXfzvK5dozz7af7I-qaBSvliaK7QTveXTbFFF24QNqsWa-gA-WsFf
linkProvider Hindawi Publishing
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=DBSCAN+Clustering+Algorithm+Based+on+Big+Data+Is+Applied+in+Network+Information+Security+Detection&rft.jtitle=Security+and+communication+networks&rft.au=Zhang%2C+Yan&rft.date=2022-07-12&rft.issn=1939-0114&rft.eissn=1939-0122&rft.volume=2022&rft.spage=1&rft.epage=8&rft_id=info:doi/10.1155%2F2022%2F9951609&rft.externalDBID=n%2Fa&rft.externalDocID=10_1155_2022_9951609
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1939-0114&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1939-0114&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1939-0114&client=summon