Application of Clonal Selection Clustering Algorithm for Anomaly Detection in Network Security Management
نویسندگان
چکیده
منابع مشابه
Application of Clonal Selection Clustering Algorithm for Anomaly Detec- tion in Network Security Management
Network security being of practical significance, the importance of network application, the network anomaly detection and the generalization ability are studied as a key link in the network security management. The key technology of network security management is based on: artificial intelligence theory as the research object; the clonal selection method of anomaly detection based on fuzzy clu...
متن کاملVisualize Network Anomaly Detection by Using K-means Clustering Algorithm
With the ever increasing amount of new attacks in today’s world the amount of data will keep increasing, and because of the base-rate fallacy the amount of false alarms will also increase. Another problem with detection of attacks is that they usually isn’t detected until after the attack has taken place, this makes defending against attacks hard and can easily lead to disclosure of sensitive i...
متن کاملahp algorithm and un-supervised clustering in auto insurance fraud detection
this thesis is a study on insurance fraud in iran automobile insurance industry and explores the usage of expert linkage between un-supervised clustering and analytical hierarchy process(ahp), and renders the findings from applying these algorithms for automobile insurance claim fraud detection. the expert linkage determination objective function plan provides us with a way to determine whi...
15 صفحه اولUnsupervised Clustering Approach for Network Anomaly Detection
This paper describes the advantages of using the anomaly detection approach over the misuse detection technique in detecting unknown network intrusions or attacks. It also investigates the performance of various clustering algorithms when applied to anomaly detection. Five different clustering algorithms: k-Means, improved k-Means, k-Medoids, EM clustering and distance-based outlier detection a...
متن کاملAdaptive Anomaly Detection for Network Security
Intrusion detection is an integral part of computer security. It improves the security of information systems by allowing the review of patterns of access in order to discover abnormal activity of users and serving as a deterrent to users attempts to bypass system privilege or protection mechanisms. Anomaly detection systems, a subset of intrusion detection systems, model the normal system/netw...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: The Open Automation and Control Systems Journal
سال: 2015
ISSN: 1874-4443
DOI: 10.2174/1874444301507011482