Using clustering to capture attackers

Nisha P. Shetty*

*Corresponding author for this work

    Research output: Contribution to conferencePaperpeer-review

    4 Citations (Scopus)

    Abstract

    As the attackers nowadays are getting craftier it is deemed important to have a security system which is easy to maintain and economically affordable and gives suitable defense against attacks both known and novel. In this paper, the concept of genetic programming is applied to recreate open network conditions, using records obtained from KDD Cup '99 dataset. Then the newly created records (network log headers) are assimilated in normal and attack categories using the basic fundamental of clustering i.e. intra-cluster similarity and intercluster dissimilarity. Finally results of two prominent partition based clustering approaches i.e. K-Means and K-Medoid are compared and evaluated.

    Original languageEnglish
    DOIs
    Publication statusPublished - 01-01-2016
    Event2016 International Conference on Inventive Computation Technologies, ICICT 2016 - Coimbatore, India
    Duration: 26-08-201627-08-2016

    Conference

    Conference2016 International Conference on Inventive Computation Technologies, ICICT 2016
    Country/TerritoryIndia
    CityCoimbatore
    Period26-08-1627-08-16

    All Science Journal Classification (ASJC) codes

    • Computer Vision and Pattern Recognition
    • Artificial Intelligence
    • Computer Graphics and Computer-Aided Design
    • Computer Networks and Communications
    • Computer Science Applications
    • Health Informatics

    Fingerprint

    Dive into the research topics of 'Using clustering to capture attackers'. Together they form a unique fingerprint.

    Cite this