Abstract- The traditional Intrusion detection systems have been used long time ago, namely Anomaly-Based detection and Signature-based detection but have many drawbacks that limit their performance. Consequently the main goal of this paper is to use data mining techniques including classification using clustering methods to overpass these defects. This classification will be done by using k-means algorithm. Therefore we have improved k-means to overcome its limits specially the cluster’s number initialization. The experiment results of the work done on KDD’99 dataset shows the performance of the improved k-means in detecting new attacks with more than 90 % for Dos and R2L also more than 60 % for probe and U2R
In this paper, we introduce a new clustering algorithm, FCC, for intrusion detection based on the co...
An Intrusion Detection System (IDS) is one of these layers of defense against malicious attacks. In ...
In day to day information security infrastructure, intrusion detection is indispensible. Signature b...
Intrusion detection system (IDS) is used to detect various kinds of attacks in interconnected networ...
Intrusion Detection System (IDS) plays an effective way to achieve higher security in detecting mali...
Internet is the biggest platform for people all over the world to connect with each other, and to se...
Intrusion detection system (IDS) is becoming a vital component to secure the network. A successful i...
As the Internet spreads to each corner of the world, computers are exposed to miscellaneous intrusio...
Intrusion detection systems (IDSs) effectively balance extra security appliance by identifying intru...
AbstractA common problem shared by current IDS is the high false positives and low detection rate. A...
The research on distributed intrusion detection system (DIDS) is a rapidly growing area of interest ...
Intrusion detection systems (IDSs) effectively balance extra security appliance by identifying intru...
ABSTRACT- The advances in computer technology and IT in the last few decades has led to an increased...
Intrusion Detection System (IDS) is an example of Misuse Detection System that works for detecting m...
Abstract — In the present paper a 2-means clustering-based anomaly detection technique is proposed. ...
In this paper, we introduce a new clustering algorithm, FCC, for intrusion detection based on the co...
An Intrusion Detection System (IDS) is one of these layers of defense against malicious attacks. In ...
In day to day information security infrastructure, intrusion detection is indispensible. Signature b...
Intrusion detection system (IDS) is used to detect various kinds of attacks in interconnected networ...
Intrusion Detection System (IDS) plays an effective way to achieve higher security in detecting mali...
Internet is the biggest platform for people all over the world to connect with each other, and to se...
Intrusion detection system (IDS) is becoming a vital component to secure the network. A successful i...
As the Internet spreads to each corner of the world, computers are exposed to miscellaneous intrusio...
Intrusion detection systems (IDSs) effectively balance extra security appliance by identifying intru...
AbstractA common problem shared by current IDS is the high false positives and low detection rate. A...
The research on distributed intrusion detection system (DIDS) is a rapidly growing area of interest ...
Intrusion detection systems (IDSs) effectively balance extra security appliance by identifying intru...
ABSTRACT- The advances in computer technology and IT in the last few decades has led to an increased...
Intrusion Detection System (IDS) is an example of Misuse Detection System that works for detecting m...
Abstract — In the present paper a 2-means clustering-based anomaly detection technique is proposed. ...
In this paper, we introduce a new clustering algorithm, FCC, for intrusion detection based on the co...
An Intrusion Detection System (IDS) is one of these layers of defense against malicious attacks. In ...
In day to day information security infrastructure, intrusion detection is indispensible. Signature b...