Fuzzy C-means (FCM) clustering has been used to distinguish communication network traffic outliers based on the uncommon statistical characteristics of network traffic data. The raditional FCM does not leverage spatial information in its analysis, which leads to inaccuracies in certain instances. To address this challenge, this paper proposes an adaptive fuzzy clustering technique based on existing possibilistic clustering algorithms. The proposed technique simultaneously considers distance, density, and the trend of density change of data instances in the membership degree calculation. Specifically the membership degree is quickly updated when the distance or density is beyond the pre-defined threshold, or density change does not match the...
The main aim in network anomaly detection is effectively spotting hostile events within the traffic ...
In this paper, a fuzzy graph clustering model is presented to identify overlapping communities in a ...
Abstract. In this paper, an anomaly detection method in cluster-based mo-bile ad hoc networks with a...
Real-time network traffic anomaly detection is crucial for the confidentiality, integrity, and secur...
In this paper we develop network traffic classification and anomaly detection methods based on traff...
Accurate identification of P2P traffic is critical for efficient network management and reasonable u...
This paper presents a network anomaly detection method based on fuzzy clustering. Computer security ...
This paper represents four unsupervised clustering algorithms namely sIB, RandomFlatClustering, Fart...
Abstract— Clustering is a major exploratory data mining activity, and a popular statistical data ana...
Functioning mobile telecommunication networks are taken for granted in present-day society. The netw...
Nowadays, organization networks are facing an increased number of different attacks and existing int...
Determination of traffic congestion level is one of the fundamental problems in Intelligent Transpor...
A clustering model identification method based on the statistics has been proposed to improve the ab...
This thesis focuses on anomaly detection in network traffic using clustering methods. First, basic a...
In IP networks, an anomaly detection system identifies attacks, device failures or other unknown pro...
The main aim in network anomaly detection is effectively spotting hostile events within the traffic ...
In this paper, a fuzzy graph clustering model is presented to identify overlapping communities in a ...
Abstract. In this paper, an anomaly detection method in cluster-based mo-bile ad hoc networks with a...
Real-time network traffic anomaly detection is crucial for the confidentiality, integrity, and secur...
In this paper we develop network traffic classification and anomaly detection methods based on traff...
Accurate identification of P2P traffic is critical for efficient network management and reasonable u...
This paper presents a network anomaly detection method based on fuzzy clustering. Computer security ...
This paper represents four unsupervised clustering algorithms namely sIB, RandomFlatClustering, Fart...
Abstract— Clustering is a major exploratory data mining activity, and a popular statistical data ana...
Functioning mobile telecommunication networks are taken for granted in present-day society. The netw...
Nowadays, organization networks are facing an increased number of different attacks and existing int...
Determination of traffic congestion level is one of the fundamental problems in Intelligent Transpor...
A clustering model identification method based on the statistics has been proposed to improve the ab...
This thesis focuses on anomaly detection in network traffic using clustering methods. First, basic a...
In IP networks, an anomaly detection system identifies attacks, device failures or other unknown pro...
The main aim in network anomaly detection is effectively spotting hostile events within the traffic ...
In this paper, a fuzzy graph clustering model is presented to identify overlapping communities in a ...
Abstract. In this paper, an anomaly detection method in cluster-based mo-bile ad hoc networks with a...