2012
DOI: 10.7763/ijfcc.2012.v1.5
|View full text |Cite
|
Sign up to set email alerts
|

Anomaly Intrusion Detection based on Clustering a Data Stream

Abstract: Abstract-This paper proposes a new clustering algorithm which continuously models a data stream. A set of features is used to represent the characteristics of an activity. For each feature, the clusters of feature values corresponding to activities observed so far in an audit data stream are identified by the proposed clustering algorithm for data streams. As a result, without maintaining any historical activity of a user physically, new activities of the user can be continuously reflected to the on-going resu… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 2 publications
0
1
0
Order By: Relevance
“…First, for the unsupervised model [16][17][18][19][20][21][22], it includes DBSCAN, K-means, and spectral clustering. e DBSCAN algorithm [23] has a long convergence time when the sample data is too large and is not suitable for the big data network environment.…”
Section: Detection Methodologymentioning
confidence: 99%
“…First, for the unsupervised model [16][17][18][19][20][21][22], it includes DBSCAN, K-means, and spectral clustering. e DBSCAN algorithm [23] has a long convergence time when the sample data is too large and is not suitable for the big data network environment.…”
Section: Detection Methodologymentioning
confidence: 99%