A Similarity Normal Clustering Labelling Algorithm for Clustering Network Intrusion Detection

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A clustering algorithm for intrusion detection

In this paper, we introduce a new clustering algorithm, FCC, for intrusion detection based on the concept of fuzzy connectedness. This concept was introduced by Rosenfeld in 1979 and used with success in image segmentation; here we extend this approach to clustering and demonstrate its effectiveness in intrusion detection. Starting with a single or a few seed points in each cluster, all the dat...

متن کامل

Relative Network Entropy based Clustering Algorithm for Intrusion Detection

Clustering, as a kind of data mining methods, with the characteristic of no supervising, quick modeling is widely used in intrusion detection. However, most of the traditional clustering algorithms use a single data point as a calculating unit, and the drawback exists in time wasting to calculate one data point after another when clustering, meanwhile, a single local change of data will signifi...

متن کامل

Clustering-based Network Intrusion Detection

Recently data mining methods have gained importance in addressing network security issues, including network intrusion detection—a challenging task in network security. Intrusion detection systems aim to identify attacks with a high detection rate and a low false alarm rate. Classification-based data mining models for intrusion detection are often ineffective in dealing with dynamic changes in ...

متن کامل

An Unsupervised Clustering Algorithm for Intrusion Detection

As the Internet spreads to each corner of the world, computers are exposed to miscellaneous intrusions from the World Wide Web. Thus, we need effective intrusion detection systems to protect our computers from the intrusions. Traditional instance-based learning methods can only be used to detect known intrusions since these methods classify instances based on what they have learned. They rarely...

متن کامل

Enhancing Network Intrusion Detection through Host Clustering

The state-of-the-art in intrusion detection mainly relies on signature-based techniques. Although signature-based detection is an efficient way of protecting against known threats, it will not protect against new, advanced intrusions such as Advanced Persistent Threats (APTs). Moreover, many intrusion detection systems only monitor the network traffic crossing the external border of a network, ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of Applied Sciences

سال: 2014

ISSN: 1812-5654

DOI: 10.3923/jas.2014.969.980