Using clustering to capture attackers

Nisha P. Shetty

Research output: Contribution to conferencePaper

Abstract

As the attackers nowadays are getting craftier it is deemed important to have a security system which is easy to maintain and economically affordable and gives suitable defense against attacks both known and novel. In this paper, the concept of genetic programming is applied to recreate open network conditions, using records obtained from KDD Cup '99 dataset. Then the newly created records (network log headers) are assimilated in normal and attack categories using the basic fundamental of clustering i.e. intra-cluster similarity and intercluster dissimilarity. Finally results of two prominent partition based clustering approaches i.e. K-Means and K-Medoid are compared and evaluated.

Original languageEnglish
DOIs
Publication statusPublished - 01-01-2016
Externally publishedYes
Event2016 International Conference on Inventive Computation Technologies, ICICT 2016 - Coimbatore, India
Duration: 26-08-201627-08-2016

Conference

Conference2016 International Conference on Inventive Computation Technologies, ICICT 2016
CountryIndia
CityCoimbatore
Period26-08-1627-08-16

Fingerprint

Genetic programming
Security systems
Cluster Analysis
Genetic Phenomena
Datasets

All Science Journal Classification (ASJC) codes

  • Computer Vision and Pattern Recognition
  • Artificial Intelligence
  • Computer Graphics and Computer-Aided Design
  • Computer Networks and Communications
  • Computer Science Applications
  • Health Informatics

Cite this

Shetty, N. P. (2016). Using clustering to capture attackers. Paper presented at 2016 International Conference on Inventive Computation Technologies, ICICT 2016, Coimbatore, India. https://doi.org/10.1109/INVENTIVE.2016.7830117
Shetty, Nisha P. / Using clustering to capture attackers. Paper presented at 2016 International Conference on Inventive Computation Technologies, ICICT 2016, Coimbatore, India.
@conference{faa2546ef7da4c329e6be2ed538db477,
title = "Using clustering to capture attackers",
abstract = "As the attackers nowadays are getting craftier it is deemed important to have a security system which is easy to maintain and economically affordable and gives suitable defense against attacks both known and novel. In this paper, the concept of genetic programming is applied to recreate open network conditions, using records obtained from KDD Cup '99 dataset. Then the newly created records (network log headers) are assimilated in normal and attack categories using the basic fundamental of clustering i.e. intra-cluster similarity and intercluster dissimilarity. Finally results of two prominent partition based clustering approaches i.e. K-Means and K-Medoid are compared and evaluated.",
author = "Shetty, {Nisha P.}",
year = "2016",
month = "1",
day = "1",
doi = "10.1109/INVENTIVE.2016.7830117",
language = "English",
note = "2016 International Conference on Inventive Computation Technologies, ICICT 2016 ; Conference date: 26-08-2016 Through 27-08-2016",

}

Shetty, NP 2016, 'Using clustering to capture attackers' Paper presented at 2016 International Conference on Inventive Computation Technologies, ICICT 2016, Coimbatore, India, 26-08-16 - 27-08-16, . https://doi.org/10.1109/INVENTIVE.2016.7830117

Using clustering to capture attackers. / Shetty, Nisha P.

2016. Paper presented at 2016 International Conference on Inventive Computation Technologies, ICICT 2016, Coimbatore, India.

Research output: Contribution to conferencePaper

TY - CONF

T1 - Using clustering to capture attackers

AU - Shetty, Nisha P.

PY - 2016/1/1

Y1 - 2016/1/1

N2 - As the attackers nowadays are getting craftier it is deemed important to have a security system which is easy to maintain and economically affordable and gives suitable defense against attacks both known and novel. In this paper, the concept of genetic programming is applied to recreate open network conditions, using records obtained from KDD Cup '99 dataset. Then the newly created records (network log headers) are assimilated in normal and attack categories using the basic fundamental of clustering i.e. intra-cluster similarity and intercluster dissimilarity. Finally results of two prominent partition based clustering approaches i.e. K-Means and K-Medoid are compared and evaluated.

AB - As the attackers nowadays are getting craftier it is deemed important to have a security system which is easy to maintain and economically affordable and gives suitable defense against attacks both known and novel. In this paper, the concept of genetic programming is applied to recreate open network conditions, using records obtained from KDD Cup '99 dataset. Then the newly created records (network log headers) are assimilated in normal and attack categories using the basic fundamental of clustering i.e. intra-cluster similarity and intercluster dissimilarity. Finally results of two prominent partition based clustering approaches i.e. K-Means and K-Medoid are compared and evaluated.

UR - http://www.scopus.com/inward/record.url?scp=85022337320&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=85022337320&partnerID=8YFLogxK

U2 - 10.1109/INVENTIVE.2016.7830117

DO - 10.1109/INVENTIVE.2016.7830117

M3 - Paper

ER -

Shetty NP. Using clustering to capture attackers. 2016. Paper presented at 2016 International Conference on Inventive Computation Technologies, ICICT 2016, Coimbatore, India. https://doi.org/10.1109/INVENTIVE.2016.7830117