Netinfo Security ›› 2016, Vol. 16 ›› Issue (6): 35-40.doi: 10.3969/j.issn.1671-1122.2016.06.006
• Orginal Article • Previous Articles Next Articles
Lianqun YANG1, Jinying WEN1, Shufa LIU2, Feng WANG3
Received:
2016-05-15
Online:
2016-06-20
Published:
2020-05-13
CLC Number:
Lianqun YANG, Jinying WEN, Shufa LIU, Feng WANG. An Improved Graph Partitioning Algorithm for User Behavior Abnormal Detection[J]. Netinfo Security, 2016, 16(6): 35-40.
Add to citation manager EndNote|Ris|BibTeX
URL: http://netinfo-security.org/EN/10.3969/j.issn.1671-1122.2016.06.006
[1] | CHARU C.AGGARWAL. Outlier Analysis[M].Berlin Heidelberg:Springer,2013. |
[2] | CHANDOLA V, BANERJEE A,KUMER V.Anomaly Detection for Discrete Sequences: A Survey[J]. IEEE Transactions on Knowledge and Data Engineering,2009, 24(11):823-839. |
[3] | NOBLE C C,COOK D J.Graph-based Anomaly Detection[C]//ACM, KDD '03.9th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. August 24-27,2003. Washington,DC,USA. New York:ACM, 2003:631-636. |
[4] | TONG Hanghang, LIN Chingyung .Non-Negative Residual Matrix Factorization with Application to Graph Anomaly Detection[C]// SIAM,Eleventh SIAM International Conference on Data Mining, SDM 2011, April 28-30, 2011, Mesa, Arizona, USA. Philadelphia, PA:SIAM,2011:143-153. |
[5] | LEE D D. Algorithms for Non-negative Matrix Factorization[J]. Advances in Neural Information Processing Systems, 2015, 13(6):556--562. |
[6] | YAO S Z.Spectral Partitioning: The More Eigenvectors, The Better[C]// IEEE,32nd Design Automation Conference : proceedings 1995, June 12-16, 1995,San Francisco, USA. New Jersey:IEEE,1995, 90(3):195-200. |
[7] | FAN R K C. Spectral Graph Theory[M].Washington, DC:AMS,1997. |
[8] | LIN H, ZHU Q.A Spectral Clustering-Based Dataset Structure Analysis and Outlier Detection Progress[J]. Journal of Computational Information Systems, 2012, 8(1):115-124. |
[9] | KARYPIS G, KUMAR V.Parallel Multilevel k-way Partitioning Scheme for Irregular Graphs[J].Siam Review, 1999, 41(2):278-300. |
[10] | HENDRICKSON B, LELAND R.A Multilevel Algorithm for Partitioning Graphs[C]// Supercomputing. Proceedings of the IEEE/ACM SC95 Conference. December 3-8,1995,San Diego,California,USA. New York:Association for Computing Machinery, 1995:28. |
[11] | KARYPIS G, KUMAR V. A Fast And High Quality Multilevel Scheme For Partitioning Irregular Graphs[J]. SIAM Journal on Scientific Computing, 2006, 20(1):359--392. |
[12] | DONGEN S M V. Graph Clustering by Flow Simulation [D]. Netherlands: Utrecht University,2001. |
[13] | BROHEE S, HELDEN J V.Evaluation of Clustering Algorithms for Protein-protein Interaction Networks[J]. BMC Bioinformatics, 2006, 7(1602):2791-2797. |
[14] | 尚进,谢军, 蒋东毅,等. 现代网络安全架构异常行为分析模型研究[J]. 信息网络安全,2015,(9):15-19. |
[15] | 牛秦州,陈艳. 基于MCL与KNN的混合聚类算法[J].桂林理工大学学报,2015,35(1):181-186. |
[16] | MICHAEL MITZENMACHER.A Brief History of Generative Models for Power Law and Lognormal Distributions[J].Internet Mathematics. 2004,1(2):226-251. |
[17] | GOLDSTEIN M L, MORRIS S A, YEN G G.Problems with Fitting to the Power-Law Distribution[J]. Physics of Condensed Matter, 2004, 41(2):255-258. |
[18] | VINH N X, EPPS J, BAILEY J.Information Theoretic Measures for Clusterings Comparison[J]. Journal of Machine Learning Research, 2010, 11(1):2837-2854. |
[19] | JURE L, ANDREJ K. Large Network Dataset Collection [EB/OL]. |
[1] | Zhiyan ZHAO, Xiaomo JI. Research on the Intelligent Fusion Model of Network Security Situation Awareness [J]. Netinfo Security, 2020, 20(4): 87-93. |
[2] | Min LIU, Shuhui CHEN. Research on VoLTE Traffic Based on Association Fusion [J]. Netinfo Security, 2020, 20(4): 81-86. |
[3] | Lingyu BIAN, Linlin ZHANG, Kai ZHAO, Fei SHI. Ethereum Malicious Account Detection Method Based on LightGBM [J]. Netinfo Security, 2020, 20(4): 73-80. |
[4] | Yifeng DU, Yuanbo GUO. A Dynamic Access Control Method for Fog Computing Based on Trust Value [J]. Netinfo Security, 2020, 20(4): 65-72. |
[5] | Zhizhou FU, Liming WANG, Ding TANG, Shuguang ZHANG. HBase Secondary Ciphertext Indexing Method Based on Homomorphic Encryption [J]. Netinfo Security, 2020, 20(4): 55-64. |
[6] | Rong WANG, Chunguang MA, Peng WU. An Intrusion Detection Method Based on Federated Learning and Convolutional Neural Network [J]. Netinfo Security, 2020, 20(4): 47-54. |
[7] | Xiaoli DONG, Shuai SHANG, Jie CHEN. Impossible Differential Attacks on 9-Round Block Cipher Rijndael-192 [J]. Netinfo Security, 2020, 20(4): 40-46. |
[8] | Chun GUO, Changqing CHEN, Guowei SHEN, Chaohui JIANG. A Ransomware Classification Method Based on Visualization [J]. Netinfo Security, 2020, 20(4): 31-39. |
[9] | Lu CHEN, Yajie SUN, Liqiang ZHANG, Yun CHEN. A Scheme of Measurement for Terminal Equipment Based on DICE in IoT [J]. Netinfo Security, 2020, 20(4): 21-30. |
[10] | Jinfang JIANG, Guangjie HAN. Survey of Trust Management Mechanism in Wireless Sensor Network [J]. Netinfo Security, 2020, 20(4): 12-20. |
[11] | Jianwei LIU, Yiran HAN, Bin LIU, Beiyuan YU. Research on 5G Network Slicing Security Model [J]. Netinfo Security, 2020, 20(4): 1-11. |
[12] | Peng LIU, Qian HE, Wangyang LIU, Xu CHENG. CP-ABE Scheme Supporting Attribute Revocation and Outsourcing Decryption [J]. Netinfo Security, 2020, 20(3): 90-97. |
[13] | Yubo SONG, Ming FAN, Junjie YANG, Aiqun HU. Multipath Solution and Blocking Method of Network Attack Traffic Based on Topology Analysis [J]. Netinfo Security, 2020, 20(3): 9-17. |
[14] | Tengfei WANG, Manchun CAI, Tianliang LU, Ting YUE. IPv6 Network Attack Source Tracing Method Based on iTrace_v6 [J]. Netinfo Security, 2020, 20(3): 83-89. |
[15] | Yi ZHANG, Hongyan LIU, Hequn XIAN, Chengliang TIAN. A Cloud Storage Encrypted Data Deduplication Method Based on Authorization Records [J]. Netinfo Security, 2020, 20(3): 75-82. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||