Abstract
As the attackers nowadays are getting craftier it is deemed important to have a security system which is easy to maintain and economically affordable and gives suitable defense against attacks both known and novel. In this paper, the concept of genetic programming is applied to recreate open network conditions, using records obtained from KDD Cup '99 dataset. Then the newly created records (network log headers) are assimilated in normal and attack categories using the basic fundamental of clustering i.e. intra-cluster similarity and intercluster dissimilarity. Finally results of two prominent partition based clustering approaches i.e. K-Means and K-Medoid are compared and evaluated.
Original language | English |
---|---|
DOIs | |
Publication status | Published - 01-01-2016 |
Event | 2016 International Conference on Inventive Computation Technologies, ICICT 2016 - Coimbatore, India Duration: 26-08-2016 → 27-08-2016 |
Conference
Conference | 2016 International Conference on Inventive Computation Technologies, ICICT 2016 |
---|---|
Country/Territory | India |
City | Coimbatore |
Period | 26-08-16 → 27-08-16 |
All Science Journal Classification (ASJC) codes
- Computer Vision and Pattern Recognition
- Artificial Intelligence
- Computer Graphics and Computer-Aided Design
- Computer Networks and Communications
- Computer Science Applications
- Health Informatics