{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,25]],"date-time":"2026-03-25T15:54:38Z","timestamp":1774454078981,"version":"3.50.1"},"reference-count":36,"publisher":"SAGE Publications","issue":"4","license":[{"start":{"date-parts":[[2024,11,1]],"date-time":"2024-11-01T00:00:00Z","timestamp":1730419200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["Intelligent Decision Technologies"],"published-print":{"date-parts":[[2024,11]]},"abstract":"<jats:p> The Network Security Monitoring System (NSMS) can use Big Data (BD) and K-means DT (K-means with distance threshold) algorithms to automatically learn and identify abnormal patterns in the network, improving the accuracy of network threat detection. In this article, KDD Cup 1999 and NSL KDD were selected as NSMS for dataset analysis. Preprocess the data; Extract statistical information, time series information, and traffic distribution characteristics. Value device DT further classifies regular attacks, remote location (R2L) attacks, and user to root (U2R) permission attacks. The experimental results show that the hybrid intrusion detection algorithm based on K-means DT achieves a network attack detection accuracy of 99.2% and a network attack detection accuracy of 98.9% on the NSL-KDD dataset. Hybrid intrusion detection algorithms can effectively improve the accuracy of network intrusion detection (NID). The hybrid intrusion detection system proposed in this article performs well on different datasets and can effectively detect various types of network intrusion attacks, with better performance than other algorithms. The NSMS designed in this article can cope with constantly changing network threats. <\/jats:p>","DOI":"10.3233\/idt-240185","type":"journal-article","created":{"date-parts":[[2024,8,2]],"date-time":"2024-08-02T13:35:35Z","timestamp":1722605735000},"page":"3105-3118","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":1,"title":["Design of network security monitoring system based on K-means clustering algorithm"],"prefix":"10.1177","volume":"18","author":[{"given":"Lin","family":"Yu*","sequence":"first","affiliation":[{"name":"Department of Health Management, Zhengzhou Shuqing Medical College, Zhengzhou, Henan, China"}]},{"given":"Yujie","family":"Bai","sequence":"additional","affiliation":[{"name":"Department of Health Management, Zhengzhou Shuqing Medical College, Zhengzhou, Henan, China"}]}],"member":"179","published-online":{"date-parts":[[2024,11,1]]},"reference":[{"issue":"4","key":"bibr1-IDT-240185","first-page":"628","volume":"42","author":"Xiong JX","year":"2020","journal-title":"Computer Engineering and Science"},{"issue":"3","key":"bibr2-IDT-240185","first-page":"56","volume":"17","author":"Zhang ZX","year":"2018","journal-title":"Software Guide"},{"key":"bibr3-IDT-240185","doi-asserted-by":"publisher","DOI":"10.1504\/IJSSE.2020.109127"},{"key":"bibr4-IDT-240185","doi-asserted-by":"publisher","DOI":"10.1080\/09720510.2019.1580907"},{"issue":"4","key":"bibr5-IDT-240185","first-page":"96","volume":"5","author":"Jian SJ","year":"2020","journal-title":"Journal of Information Security"},{"issue":"11","key":"bibr6-IDT-240185","first-page":"2277","volume":"34","author":"Zhang WA","year":"2019","journal-title":"Control and Decision-Making"},{"issue":"9","key":"bibr7-IDT-240185","first-page":"33","volume":"16","author":"Ding W","year":"2018","journal-title":"Power Information and Communication Technology"},{"issue":"2","key":"bibr8-IDT-240185","first-page":"94","volume":"5","author":"Shao CL","year":"2023","journal-title":"Water Conservancy And Electric Power Technology And Application"},{"issue":"2","key":"bibr9-IDT-240185","first-page":"37","volume":"15","author":"Zhang TM","year":"2018","journal-title":"Wireless Interconnection Technology"},{"key":"bibr10-IDT-240185","doi-asserted-by":"publisher","DOI":"10.11591\/ijeecs.v26.i3.pp1781-1790"},{"issue":"0","key":"bibr11-IDT-240185","first-page":"50","volume":"46","author":"Mohammadpour Leila","year":"2018","journal-title":"Proceedings of the Asia-Pacific Advanced Network"},{"key":"bibr12-IDT-240185","doi-asserted-by":"publisher","DOI":"10.5815\/ijcnis.2019.03.02"},{"issue":"10","key":"bibr13-IDT-240185","first-page":"86","volume":"46","author":"Ma TN","year":"2018","journal-title":"Smart Power"},{"issue":"13","key":"bibr14-IDT-240185","first-page":"23","volume":"41","author":"Li JH","year":"2018","journal-title":"Electronic Measurement Technology"},{"issue":"6","key":"bibr15-IDT-240185","first-page":"1077","volume":"33","author":"Wang L","year":"2018","journal-title":"Data Collection and Processing"},{"issue":"18","key":"bibr16-IDT-240185","first-page":"161","volume":"49","author":"Li Q","year":"2021","journal-title":"Power System Protection And Control"},{"key":"bibr17-IDT-240185","doi-asserted-by":"publisher","DOI":"10.11959\/j.issn.1000-436x.2024020"},{"issue":"6","key":"bibr18-IDT-240185","first-page":"1112","volume":"41","author":"Xu ZY","year":"2023","journal-title":"Journal of Jilin University (Information Science Edition)"},{"issue":"2","key":"bibr19-IDT-240185","first-page":"34","volume":"4","author":"Zhang F","year":"2018","journal-title":"Journal of Network and Information Security"},{"issue":"1","key":"bibr20-IDT-240185","first-page":"38","volume":"16","author":"Chang LW","year":"2021","journal-title":"Journal of Intelligent Systems"},{"issue":"3","key":"bibr21-IDT-240185","first-page":"38","volume":"36","author":"Chen Y","year":"2019","journal-title":"Jiangsu Science and Technology Information"},{"issue":"3","key":"bibr22-IDT-240185","first-page":"6","volume":"7","author":"Yang ZY","year":"2020","journal-title":"Southern Energy Construction"},{"key":"bibr23-IDT-240185","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2018.2888764"},{"issue":"6","key":"bibr24-IDT-240185","first-page":"938","volume":"5","author":"Mr S","year":"2018","journal-title":"International Research Journal of Engineering and Technology"},{"key":"bibr25-IDT-240185","doi-asserted-by":"publisher","DOI":"10.4018\/IJISP.201907010102"},{"key":"bibr26-IDT-240185","doi-asserted-by":"publisher","DOI":"10.30684\/etj.v39i7.1695"},{"issue":"7","key":"bibr27-IDT-240185","first-page":"9","volume":"36","author":"Han SA","year":"2020","journal-title":"Power Grid and Clean Energy"},{"issue":"1","key":"bibr28-IDT-240185","first-page":"1","volume":"18","author":"Chetan M","journal-title":"International Journal of Intelligent Information Technologies. (IJIIT)"},{"key":"bibr29-IDT-240185","doi-asserted-by":"publisher","DOI":"10.11648\/j.ajnna.20190501.12"},{"issue":"3","key":"bibr30-IDT-240185","volume":"4","author":"Stauffer J","year":"2024","journal-title":"Discov Internet Things"},{"key":"bibr31-IDT-240185","unstructured":"HuS. Full target k-coverage retention at the boundary of smart sensor networks, Engineering Intelligent Systems. 2024; 32(2): 145-153."},{"key":"bibr32-IDT-240185","doi-asserted-by":"publisher","DOI":"10.1504\/IJGUC.2024.137908"},{"issue":"1","key":"bibr33-IDT-240185","volume":"40","author":"Xu XD","year":"2024","journal-title":"Comput"},{"issue":"1","key":"bibr34-IDT-240185","first-page":"27","volume":"11","author":"Cuong D","year":"2018","journal-title":"International Journal of Intelligent Information and Database Systems"},{"issue":"2","key":"bibr35-IDT-240185","first-page":"64","volume":"52","author":"Xie B","year":"2020","journal-title":"Journal of Zhengzhou University (Science Edition)"},{"issue":"2","key":"bibr36-IDT-240185","first-page":"128","volume":"34","author":"Ma ZL","year":"2018","journal-title":"Journal of Ludong University: Natural Science Edition"}],"container-title":["Intelligent Decision Technologies"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.3233\/IDT-240185","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/full-xml\/10.3233\/IDT-240185","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.3233\/IDT-240185","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,10]],"date-time":"2025-03-10T12:32:54Z","timestamp":1741609974000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/10.3233\/IDT-240185"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11]]},"references-count":36,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2024,11]]}},"alternative-id":["10.3233\/IDT-240185"],"URL":"https:\/\/doi.org\/10.3233\/idt-240185","relation":{},"ISSN":["1872-4981","1875-8843"],"issn-type":[{"value":"1872-4981","type":"print"},{"value":"1875-8843","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,11]]}}}