Proceedings of the the International Conference on Engineering &Amp; MIS 2015 2015
DOI: 10.1145/2832987.2833082
|View full text |Cite
|
Sign up to set email alerts
|

An improved k-Means Clustering algorithm for Intrusion Detection using Gaussian function

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
6
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
8
2

Relationship

0
10

Authors

Journals

citations
Cited by 47 publications
(6 citation statements)
references
References 12 publications
0
6
0
Order By: Relevance
“…To give users security, it is necessary to address the weaknesses and problems each of these services and methods possesses [2]. In recent years, different methods have been proposed for the IDS, such as the traditional machine learning techniques, for example, the support vector machine (SVM) [3,4], decision trees [5,6], k-means clustering [7,8], and others. The recent advances in deep neural networks, including conventional neural networks (CNNs) and recurrent neural networks (RNNs), were also adopted in this field [9].…”
Section: Introductionmentioning
confidence: 99%
“…To give users security, it is necessary to address the weaknesses and problems each of these services and methods possesses [2]. In recent years, different methods have been proposed for the IDS, such as the traditional machine learning techniques, for example, the support vector machine (SVM) [3,4], decision trees [5,6], k-means clustering [7,8], and others. The recent advances in deep neural networks, including conventional neural networks (CNNs) and recurrent neural networks (RNNs), were also adopted in this field [9].…”
Section: Introductionmentioning
confidence: 99%
“…First, k-means has proven its validity in clustering. It has a great number of improved versions that are used in different research fields [25,26,33,66]. For instance, k-means++ is a sophisticated type of k-means.…”
Section: Instance Selection-based Studiesmentioning
confidence: 99%
“…Previously, different methods have been developed for intrusion detection systems (IDS) using traditional machine learning methods, such as k-means clustering [ 2 , 3 ], decision tree (DT) [ 4 , 5 ], k-nearest neighbor (kNN) [ 6 , 7 ], support vector machine (SVM) [ 8 , 9 ], and other traditional machine learning (ML) approaches. With the wide spread of the deep learning methods, in recent years thy are also adopted for IDS, such as multi-layered perceptron neural network [ 10 ], convolutional neural networks (CNN) [ 11 ], and deep recurrent neural network (RNN) [ 12 ].…”
Section: Introductionmentioning
confidence: 99%