2012 7th International Conference on Computer Science &Amp; Education (ICCSE) 2012
DOI: 10.1109/iccse.2012.6295306
|View full text |Cite
|
Sign up to set email alerts
|

A graph-based clustering algorithm for anomaly intrusion detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
21
0

Year Published

2012
2012
2020
2020

Publication Types

Select...
5
4
1

Relationship

0
10

Authors

Journals

citations
Cited by 38 publications
(21 citation statements)
references
References 8 publications
0
21
0
Order By: Relevance
“…[3] the paper also discussed the protocols and their immunities to different attacks with analytical modeling and mathematical formulation. A graph based approach is proposed by Zhou Mingqiang et al [11] they proposed graph-based intrusion detection algorithm by using outlier detection method that based on local deviation coefficient (LDCGB). Compared to other intrusion detection algorithm of clustering, this algorithm is unnecessary to initial cluster number.…”
Section: Releted Workmentioning
confidence: 99%
“…[3] the paper also discussed the protocols and their immunities to different attacks with analytical modeling and mathematical formulation. A graph based approach is proposed by Zhou Mingqiang et al [11] they proposed graph-based intrusion detection algorithm by using outlier detection method that based on local deviation coefficient (LDCGB). Compared to other intrusion detection algorithm of clustering, this algorithm is unnecessary to initial cluster number.…”
Section: Releted Workmentioning
confidence: 99%
“…One example of anomaly-based implementations is the use of data mining algorithms to extract and identify valid, novel, and useful patterns in audit data. Several data mining algorithms have been used for anomaly-based IDPS including support vector machines [67,169], genetic algorithms [66,186], neural networks [211,278], and clustering [135,207,212], all of which improve the detection accuracy of IDPS and assist in detecting new attacks.…”
Section: Detection Methodologiesmentioning
confidence: 99%
“…Various data mining's methods and algorithms have been used such as classification tree and support vector machines for intrusion detection [4], Genetic Algorithms, Neural Networks [3], and Clustering [5][6][7], all these methods helps to provide a good level of security to the systems from external and internal attacks, also from new attacks.…”
Section: Introductionmentioning
confidence: 99%