[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Bharti et al., 2010 - Google Patents

Intrusion detection using clustering

Bharti et al., 2010

View PDF
Document ID
1894905089464962039
Author
Bharti K
Shukla S
Jain S
Publication year
Publication venue
Proceeding of the Association of Counseling Center Training Agencies (ACCTA)

External Links

Snippet

In increasing trends of network environment every one gets connected to the system. So there is need of securing information, because there are lots of security threats are present in network environment. A number of techniques are available for intrusion detection. Data …
Continue reading at core.ac.uk (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/3061Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
    • G06F17/30705Clustering or classification
    • G06F17/3071Clustering or classification including class or cluster creation or modification
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/50Computer-aided design
    • G06F17/5009Computer-aided design using simulation
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/34Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation; Recording or statistical evaluation of user activity, e.g. usability assessment
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F7/00Methods or arrangements for processing data by operating upon the order or content of the data handled
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2201/00Indexing scheme relating to error detection, to error correction, and to monitoring
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N99/00Subject matter not provided for in other groups of this subclass
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F19/00Digital computing or data processing equipment or methods, specially adapted for specific applications
    • G06F19/10Bioinformatics, i.e. methods or systems for genetic or protein-related data processing in computational molecular biology

Similar Documents

Publication Publication Date Title
Parsaei et al. A hybrid data mining approach for intrusion detection on imbalanced NSL-KDD dataset
US10389745B2 (en) System and methods for detecting bots real-time
Jianliang et al. The application on intrusion detection based on k-means cluster algorithm
CN105577679B (en) A kind of anomalous traffic detection method based on feature selecting and density peaks cluster
Relan et al. Implementation of network intrusion detection system using variant of decision tree algorithm
Taghavinejad et al. Intrusion detection in IoT-based smart grid using hybrid decision tree
CN107493277B (en) Large data platform online anomaly detection method based on maximum information coefficient
Goel et al. Parallel Misuse and Anomaly Detection Model.
US11159564B2 (en) Detecting zero-day attacks with unknown signatures via mining correlation in behavioral change of entities over time
Mohammed et al. Edge computing intelligence using robust feature selection for network traffic classification in internet-of-things
Boukhalfa et al. Parallel processing using big data and machine learning techniques for intrusion detection
Bharti et al. Intrusion detection using clustering
El Mrabet et al. A performance comparison of data mining algorithms based intrusion detection system for smart grid
Banik et al. Anomaly detection techniques in smart grid systems: A review
Golczynski et al. End-to-end anomaly detection for identifying malicious cyber behavior through NLP-based log embeddings
Monshizadeh et al. Security related data mining
Al-Ghaili et al. A Review of anomaly detection techniques in advanced metering infrastructure
Petersen Data mining for network intrusion detection: A comparison of data mining algorithms and an analysis of relevant features for detecting cyber-attacks
CN110943974A (en) DDoS (distributed denial of service) anomaly detection method and cloud platform host
Soheily-Khah et al. Intrusion detection in network systems through hybrid supervised and unsupervised mining process-a detailed case study on the ISCX benchmark dataset
Sharma et al. Towards MapReduce based classification approaches for Intrusion Detection
Jamil et al. Online P2P Internet traffic classification and mitigation based on snort and ML
Nazarudeen et al. Efficient DDoS Attack Detection using Machine Learning Techniques
Panja et al. Anomaly detection in iot using extended isolation forest
Chaturvedi et al. Anomaly detection in network using data mining techniques