Using clustering to capture attackers

Nisha P. Shetty

Research output: Contribution to conferencePaper

3 Citations (Scopus)

Abstract

As the attackers nowadays are getting craftier it is deemed important to have a security system which is easy to maintain and economically affordable and gives suitable defense against attacks both known and novel. In this paper, the concept of genetic programming is applied to recreate open network conditions, using records obtained from KDD Cup '99 dataset. Then the newly created records (network log headers) are assimilated in normal and attack categories using the basic fundamental of clustering i.e. intra-cluster similarity and intercluster dissimilarity. Finally results of two prominent partition based clustering approaches i.e. K-Means and K-Medoid are compared and evaluated.

Original languageEnglish
DOIs
Publication statusPublished - 01-01-2016
Externally publishedYes
Event2016 International Conference on Inventive Computation Technologies, ICICT 2016 - Coimbatore, India
Duration: 26-08-201627-08-2016

Conference

Conference2016 International Conference on Inventive Computation Technologies, ICICT 2016
CountryIndia
CityCoimbatore
Period26-08-1627-08-16

All Science Journal Classification (ASJC) codes

  • Computer Vision and Pattern Recognition
  • Artificial Intelligence
  • Computer Graphics and Computer-Aided Design
  • Computer Networks and Communications
  • Computer Science Applications
  • Health Informatics

Fingerprint Dive into the research topics of 'Using clustering to capture attackers'. Together they form a unique fingerprint.

  • Cite this

    Shetty, N. P. (2016). Using clustering to capture attackers. Paper presented at 2016 International Conference on Inventive Computation Technologies, ICICT 2016, Coimbatore, India. https://doi.org/10.1109/INVENTIVE.2016.7830117