2017 IEEE International Congress on Big Data (BigData Congress) 2017
DOI: 10.1109/bigdatacongress.2017.45
|View full text |Cite
|
Sign up to set email alerts
|

An Effective Distributed GHSOM Algorithm for Unsupervised Clustering on Big Data

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 16 publications
0
4
0
Order By: Relevance
“…Deep learning methods have shown significant potential to detect this type of anomalies [5,[11][12][13][14][15][16][17][18][19][20][21][22]. Albeit studied methods vary from image processing to signal processing and so forth, basic functionalities can be converted to another type of detection process.…”
Section: Previously Unknown Attacksmentioning
confidence: 99%
See 1 more Smart Citation
“…Deep learning methods have shown significant potential to detect this type of anomalies [5,[11][12][13][14][15][16][17][18][19][20][21][22]. Albeit studied methods vary from image processing to signal processing and so forth, basic functionalities can be converted to another type of detection process.…”
Section: Previously Unknown Attacksmentioning
confidence: 99%
“…To support the usage of GHSOM in our method, Chiu et al stated that 2D Self-Organising Map (SOM) has two disadvantages: (i) map size has to be defined before training process; and (ii) there are no hierarchical relations between clusters. Their test results also show low false positive and negative rates [12]. Therefore, we do not limit the cluster expansions or the GHSOM size, as there does not exist any information on how many clusters should be chosen or how high or wide the GHSOM should grow.…”
Section: Outlier Classificationmentioning
confidence: 99%
“…Meanwhile, Distributed GHSOM which is Growing Hierarchical Self Organizing Maps is an unsupervised clustering algorithm for Big Data has been proposed by [9]. To fulfill the requirement on tolerance of variation between samples, the proposed method clusters the data samples dynamically.…”
Section: ) Identifying the Number Of Clusters (K)mentioning
confidence: 99%
“…First, clustering is one of the best method in recognizing similar binaries and put them in one group as used by [1]- [4]. Other researchers [4]- [9] shows that recognizing the malware in malware analysis by using K-Means clustering method is the best way. However, none of them use this method using registry information to analyze the malware.…”
Section: Introductionmentioning
confidence: 99%