A server needs strong security systems. For this goal, a new perspective to network security is won by using data mining paradigms like outlier detection, clustering and classification. This study uses K-Nearest Neighbor (KNN) algorithm for clustering and classification. KNN algorithm needs data warehouse which impersonates user profiles to cluster. Therefore, requested time intervals and requested IPs with text mining are used for user profiles. Users in the network are clustered by calculating optimum k and threshold parameters of KNN algorithm. Finally, over these clusters, new requests are separated as outlier or normal by different threshold values with different priority weight values and average similarities with different priority w...
Abstract — Outlier mining is one of the most important tasks of discovering the data records which h...
In day to day information security infrastructure, intrusion detection is indispensible. Signature b...
An Intrusion Detection System (IDS) is one of these layers of defense against malicious attacks. In ...
A server needs strong security systems. For this goal, a new perspective to network security is won ...
Intrusion detection is crucial in computer network security issues; therefore, this work is aimed at...
The tremendous advancement and increase in usage of internet have increased the number of intruders ...
Διπλωματική εργασία--Πανεπιστήμιο Μακεδονίας, Θεσσαλονίκη, 2014.In this paper we outline the basic p...
In this paper we present “A Novel clustering algorithm” which is a partition based clustering algori...
Intrusion Detection System (IDS) is a system that provides a layer of security to an organization’s ...
The detection of outliers has gained considerable interest in data mining with the realization that ...
Recently, the data flow over the internet has exponentially increased due to the massive growth of c...
International audienceNetwork Intrusion Detection is a complex classification problem aimed ...
Data mining has become one of the most popular and new technology that it has gained a lot of attent...
Information Technology has become a main and important component to support critical infrastructure ...
AbstractIntrusions pose a serious securing risk in a network environment. Network intrusion detectio...
Abstract — Outlier mining is one of the most important tasks of discovering the data records which h...
In day to day information security infrastructure, intrusion detection is indispensible. Signature b...
An Intrusion Detection System (IDS) is one of these layers of defense against malicious attacks. In ...
A server needs strong security systems. For this goal, a new perspective to network security is won ...
Intrusion detection is crucial in computer network security issues; therefore, this work is aimed at...
The tremendous advancement and increase in usage of internet have increased the number of intruders ...
Διπλωματική εργασία--Πανεπιστήμιο Μακεδονίας, Θεσσαλονίκη, 2014.In this paper we outline the basic p...
In this paper we present “A Novel clustering algorithm” which is a partition based clustering algori...
Intrusion Detection System (IDS) is a system that provides a layer of security to an organization’s ...
The detection of outliers has gained considerable interest in data mining with the realization that ...
Recently, the data flow over the internet has exponentially increased due to the massive growth of c...
International audienceNetwork Intrusion Detection is a complex classification problem aimed ...
Data mining has become one of the most popular and new technology that it has gained a lot of attent...
Information Technology has become a main and important component to support critical infrastructure ...
AbstractIntrusions pose a serious securing risk in a network environment. Network intrusion detectio...
Abstract — Outlier mining is one of the most important tasks of discovering the data records which h...
In day to day information security infrastructure, intrusion detection is indispensible. Signature b...
An Intrusion Detection System (IDS) is one of these layers of defense against malicious attacks. In ...