Intrusion detection is crucial in computer network security issues; therefore, this work is aimed at maximizing network security protection and its improvement by proposing various preventive techniques. Outlier detection and semisupervised clustering algorithms based on shared nearest neighbors are proposed in this work to address intrusion detection by converting it into a problem of mining outliers using the network behavior dataset. The algorithm uses shared nearest neighbors as similarity, judges whether it is an outlier according to the number of nearest neighbors of a data point, and performs semisupervised clustering on the dataset where outliers are deleted. In the process of semisupervised clustering, vast prior knowledge is added...
Outlier Detection is a technique to detect anomalous events or outliers during analysis of the data ...
Most existing network intrusion detection systems use signature-based methods which depend on labele...
AbstractIntrusions pose a serious securing risk in a network environment. Network intrusion detectio...
The tremendous advancement and increase in usage of internet have increased the number of intruders ...
is a demandable, efficient and emerging area of Computer Science Engineering which has been currentl...
A server needs strong security systems. For this goal, a new perspective to network security is won ...
The detection of outliers has gained considerable interest in data mining with the realization that ...
International audienceData mining for intrusion detection can be divided into several sub-topics, am...
Part 2: The 2014 Asian Conference on Availability, Reliability and Security, AsiaARES 2014Internatio...
An Intrusion Detection System (IDS) is one of these layers of defense against malicious attacks. In ...
Abstract. Data mining for intrusion detection can be divided into several sub-topics, among which un...
With the advent of the Internet, security has become a major concern. An intrusion detection system ...
Recently data mining methods have gained importance in addressing network security issues, including...
Διπλωματική εργασία--Πανεπιστήμιο Μακεδονίας, Θεσσαλονίκη, 2014.In this paper we outline the basic p...
Outlier detection is an important data mining task. Recently, online discovering outlier under data ...
Outlier Detection is a technique to detect anomalous events or outliers during analysis of the data ...
Most existing network intrusion detection systems use signature-based methods which depend on labele...
AbstractIntrusions pose a serious securing risk in a network environment. Network intrusion detectio...
The tremendous advancement and increase in usage of internet have increased the number of intruders ...
is a demandable, efficient and emerging area of Computer Science Engineering which has been currentl...
A server needs strong security systems. For this goal, a new perspective to network security is won ...
The detection of outliers has gained considerable interest in data mining with the realization that ...
International audienceData mining for intrusion detection can be divided into several sub-topics, am...
Part 2: The 2014 Asian Conference on Availability, Reliability and Security, AsiaARES 2014Internatio...
An Intrusion Detection System (IDS) is one of these layers of defense against malicious attacks. In ...
Abstract. Data mining for intrusion detection can be divided into several sub-topics, among which un...
With the advent of the Internet, security has become a major concern. An intrusion detection system ...
Recently data mining methods have gained importance in addressing network security issues, including...
Διπλωματική εργασία--Πανεπιστήμιο Μακεδονίας, Θεσσαλονίκη, 2014.In this paper we outline the basic p...
Outlier detection is an important data mining task. Recently, online discovering outlier under data ...
Outlier Detection is a technique to detect anomalous events or outliers during analysis of the data ...
Most existing network intrusion detection systems use signature-based methods which depend on labele...
AbstractIntrusions pose a serious securing risk in a network environment. Network intrusion detectio...