A novel hyperellipsoidal clustering technique is presented for an intrusion-detection system in network security. Hyperellipsoidal clusters toward maximum intracluster similarity and minimum intercluster similarity are generated from training data sets. The novelty of the technique lies in the fact that the parameters needed to construct higher order data models in general multivariate Gaussian functions are incrementally derived from the data sets using accretive processes. The technique is implemented in a feedforward neural network that uses a Gaussian radial basis function as the model generator. An evaluation based on the inclusiveness and exclusiveness of samples with respect to specific criteria is applied to accretively learn the ou...
In this research, we propose two new clustering algorithms, the improved competitive learning networ...
Current practices for combating cyber attacks typically use Intrusion Detection Systems (IDSs) to de...
Most defence mechanisms such as a network-based intrusion detection system (NIDS) are often sub-opti...
In this paper we present “A Novel clustering algorithm” which is a partition based clustering algori...
Recently data mining methods have gained importance in addressing network security issues, including...
In the evolving nature of today’s world of network security, threats have become more and more sophi...
A novel multilevel hierarchicalKohonen Net (K-Map) for an intrusion detection system is presented. E...
AbstractThe popularity of using Internet contains some risks of network attacks. Intrusion detection...
In this paper proposed new model of Density Peak Clustering algorithm to enhance clustering of intru...
The network is a highly vulnerable venture for any organization that needs to have a set of computer...
Intrusion detection systems (IDSs) are devices or software applications that monitor networks or sys...
Critical networks require defence in depth incorporating many different security technologies includ...
Maintaining cyber security is a complex task, utilizing many levels of network information along wit...
An intrusion detection system (IDS) is used to determine when a computer or computer network is unde...
In this paper, we present an effective tree based subspace clustering technique (TreeCLUSS) for find...
In this research, we propose two new clustering algorithms, the improved competitive learning networ...
Current practices for combating cyber attacks typically use Intrusion Detection Systems (IDSs) to de...
Most defence mechanisms such as a network-based intrusion detection system (NIDS) are often sub-opti...
In this paper we present “A Novel clustering algorithm” which is a partition based clustering algori...
Recently data mining methods have gained importance in addressing network security issues, including...
In the evolving nature of today’s world of network security, threats have become more and more sophi...
A novel multilevel hierarchicalKohonen Net (K-Map) for an intrusion detection system is presented. E...
AbstractThe popularity of using Internet contains some risks of network attacks. Intrusion detection...
In this paper proposed new model of Density Peak Clustering algorithm to enhance clustering of intru...
The network is a highly vulnerable venture for any organization that needs to have a set of computer...
Intrusion detection systems (IDSs) are devices or software applications that monitor networks or sys...
Critical networks require defence in depth incorporating many different security technologies includ...
Maintaining cyber security is a complex task, utilizing many levels of network information along wit...
An intrusion detection system (IDS) is used to determine when a computer or computer network is unde...
In this paper, we present an effective tree based subspace clustering technique (TreeCLUSS) for find...
In this research, we propose two new clustering algorithms, the improved competitive learning networ...
Current practices for combating cyber attacks typically use Intrusion Detection Systems (IDSs) to de...
Most defence mechanisms such as a network-based intrusion detection system (NIDS) are often sub-opti...