Bharti et al., 2010 - Google Patents
Intrusion detection using clusteringBharti et al., 2010
View PDF- Document ID
- 1894905089464962039
- Author
- Bharti K
- Shukla S
- Jain S
- Publication year
- Publication venue
- Proceeding of the Association of Counseling Center Training Agencies (ACCTA)
External Links
Snippet
In increasing trends of network environment every one gets connected to the system. So there is need of securing information, because there are lots of security threats are present in network environment. A number of techniques are available for intrusion detection. Data …
- 238000001514 detection method 0 title abstract description 90
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/3061—Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
- G06F17/30705—Clustering or classification
- G06F17/3071—Clustering or classification including class or cluster creation or modification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/50—Computer-aided design
- G06F17/5009—Computer-aided design using simulation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/30—Monitoring
- G06F11/34—Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation; Recording or statistical evaluation of user activity, e.g. usability assessment
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F7/00—Methods or arrangements for processing data by operating upon the order or content of the data handled
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2201/00—Indexing scheme relating to error detection, to error correction, and to monitoring
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N99/00—Subject matter not provided for in other groups of this subclass
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F19/00—Digital computing or data processing equipment or methods, specially adapted for specific applications
- G06F19/10—Bioinformatics, i.e. methods or systems for genetic or protein-related data processing in computational molecular biology
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Parsaei et al. | A hybrid data mining approach for intrusion detection on imbalanced NSL-KDD dataset | |
US10389745B2 (en) | System and methods for detecting bots real-time | |
Jianliang et al. | The application on intrusion detection based on k-means cluster algorithm | |
CN105577679B (en) | A kind of anomalous traffic detection method based on feature selecting and density peaks cluster | |
Relan et al. | Implementation of network intrusion detection system using variant of decision tree algorithm | |
Taghavinejad et al. | Intrusion detection in IoT-based smart grid using hybrid decision tree | |
CN107493277B (en) | Large data platform online anomaly detection method based on maximum information coefficient | |
Goel et al. | Parallel Misuse and Anomaly Detection Model. | |
US11159564B2 (en) | Detecting zero-day attacks with unknown signatures via mining correlation in behavioral change of entities over time | |
Mohammed et al. | Edge computing intelligence using robust feature selection for network traffic classification in internet-of-things | |
Boukhalfa et al. | Parallel processing using big data and machine learning techniques for intrusion detection | |
Bharti et al. | Intrusion detection using clustering | |
El Mrabet et al. | A performance comparison of data mining algorithms based intrusion detection system for smart grid | |
Banik et al. | Anomaly detection techniques in smart grid systems: A review | |
Golczynski et al. | End-to-end anomaly detection for identifying malicious cyber behavior through NLP-based log embeddings | |
Monshizadeh et al. | Security related data mining | |
Al-Ghaili et al. | A Review of anomaly detection techniques in advanced metering infrastructure | |
Petersen | Data mining for network intrusion detection: A comparison of data mining algorithms and an analysis of relevant features for detecting cyber-attacks | |
CN110943974A (en) | DDoS (distributed denial of service) anomaly detection method and cloud platform host | |
Soheily-Khah et al. | Intrusion detection in network systems through hybrid supervised and unsupervised mining process-a detailed case study on the ISCX benchmark dataset | |
Sharma et al. | Towards MapReduce based classification approaches for Intrusion Detection | |
Jamil et al. | Online P2P Internet traffic classification and mitigation based on snort and ML | |
Nazarudeen et al. | Efficient DDoS Attack Detection using Machine Learning Techniques | |
Panja et al. | Anomaly detection in iot using extended isolation forest | |
Chaturvedi et al. | Anomaly detection in network using data mining techniques |