In this paper we present “A Novel clustering algorithm” which is a partition based clustering algorithm that works well for data with mixed numeric and categorical features for classifying anomalous and normal activities in a computer network. The proposed method first partitions the training instances into k-clusters using dissimilarity measurement. On each cluster representing a density region of normal or anomaly instances we apply either of the two rules 1.Threshold rule 2. Bayes decision rule to obtain a final decision. We report our results of applying k-prototype clustering algorithm to the extensively gathered network audit data for the 1998 DARPA intrusion detection evaluation program
Intrusion detection system (IDS) is used to detect various kinds of attacks in interconnected networ...
Signature-based intrusion detection systems look for known, suspicious patterns in the input data. I...
Network anomaly detection system enables to monitor computer network that behaves differently from t...
Abstract — Data mining methods make it probable to look for large amounts of information for charact...
In this paper proposed new model of Density Peak Clustering algorithm to enhance clustering of intru...
AbstractIntrusions pose a serious securing risk in a network environment. Network intrusion detectio...
Abstract — Data mining techniques make it possible to search large amounts of data for characteristi...
Anomaly-based Intrusion Detection System (IDS) uses known baseline to detect patterns which have dev...
An intrusion detection system (IDS) is used to determine when a computer or computer network is unde...
AbstractThe popularity of using Internet contains some risks of network attacks. Intrusion detection...
A novel hyperellipsoidal clustering technique is presented for an intrusion-detection system in netw...
Intrusion detection systems (IDSs) are devices or software applications that monitor networks or sys...
Abstract — In the present paper a 2-means clustering-based anomaly detection technique is proposed. ...
Recently data mining methods have gained importance in addressing network security issues, including...
Abstract- The traditional Intrusion detection systems have been used long time ago, namely Anomaly-...
Intrusion detection system (IDS) is used to detect various kinds of attacks in interconnected networ...
Signature-based intrusion detection systems look for known, suspicious patterns in the input data. I...
Network anomaly detection system enables to monitor computer network that behaves differently from t...
Abstract — Data mining methods make it probable to look for large amounts of information for charact...
In this paper proposed new model of Density Peak Clustering algorithm to enhance clustering of intru...
AbstractIntrusions pose a serious securing risk in a network environment. Network intrusion detectio...
Abstract — Data mining techniques make it possible to search large amounts of data for characteristi...
Anomaly-based Intrusion Detection System (IDS) uses known baseline to detect patterns which have dev...
An intrusion detection system (IDS) is used to determine when a computer or computer network is unde...
AbstractThe popularity of using Internet contains some risks of network attacks. Intrusion detection...
A novel hyperellipsoidal clustering technique is presented for an intrusion-detection system in netw...
Intrusion detection systems (IDSs) are devices or software applications that monitor networks or sys...
Abstract — In the present paper a 2-means clustering-based anomaly detection technique is proposed. ...
Recently data mining methods have gained importance in addressing network security issues, including...
Abstract- The traditional Intrusion detection systems have been used long time ago, namely Anomaly-...
Intrusion detection system (IDS) is used to detect various kinds of attacks in interconnected networ...
Signature-based intrusion detection systems look for known, suspicious patterns in the input data. I...
Network anomaly detection system enables to monitor computer network that behaves differently from t...