Using clustering to capture attackers

Research output: Contribution to conferencePaperpeer-review

4 Citations (Scopus)

Abstract

As the attackers nowadays are getting craftier it is deemed important to have a security system which is easy to maintain and economically affordable and gives suitable defense against attacks both known and novel. In this paper, the concept of genetic programming is applied to recreate open network conditions, using records obtained from KDD Cup '99 dataset. Then the newly created records (network log headers) are assimilated in normal and attack categories using the basic fundamental of clustering i.e. intra-cluster similarity and intercluster dissimilarity. Finally results of two prominent partition based clustering approaches i.e. K-Means and K-Medoid are compared and evaluated.

Original languageEnglish
DOIs
Publication statusPublished - 01-01-2016
Event2016 International Conference on Inventive Computation Technologies, ICICT 2016 - Coimbatore, India
Duration: 26-08-201627-08-2016

Conference

Conference2016 International Conference on Inventive Computation Technologies, ICICT 2016
Country/TerritoryIndia
CityCoimbatore
Period26-08-1627-08-16

All Science Journal Classification (ASJC) codes

  • Computer Vision and Pattern Recognition
  • Artificial Intelligence
  • Computer Graphics and Computer-Aided Design
  • Computer Networks and Communications
  • Computer Science Applications
  • Health Informatics

Fingerprint

Dive into the research topics of 'Using clustering to capture attackers'. Together they form a unique fingerprint.

Cite this