2013
DOI: 10.1016/j.neucom.2013.04.038
|View full text |Cite
|
Sign up to set email alerts
|

Effects-based feature identification for network intrusion detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
48
0

Year Published

2014
2014
2023
2023

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 89 publications
(48 citation statements)
references
References 44 publications
0
48
0
Order By: Relevance
“…This algorithm is different from the first three kinds of algorithms, it can not only extract the clustering of the boundary points, but also to cluster, effectively combine the two. TRICLUST, DTBOUND all belong to this kind of algorithm, in which TRICLUST focuses on the clustering function without boundary detection method and the results are given in detail [5].…”
Section: Graph Based Edge Detection Algorithmmentioning
confidence: 99%
“…This algorithm is different from the first three kinds of algorithms, it can not only extract the clustering of the boundary points, but also to cluster, effectively combine the two. TRICLUST, DTBOUND all belong to this kind of algorithm, in which TRICLUST focuses on the clustering function without boundary detection method and the results are given in detail [5].…”
Section: Graph Based Edge Detection Algorithmmentioning
confidence: 99%
“…Every new intrusion behavior is detected by the system, and the system will save the behavior and the related response of the security manager to the intrusion warehousing [5]. Similarly, the system can not automatically determine the normal access behavior of a system, the system will be stored in a typical normal access to the library.…”
Section: Typical Data Warehousingmentioning
confidence: 99%
“…The major concentration of these whole detection methods is direct to observe, differentiate and identify i.e malicious or non-malicious behaviours [6]. Procedure of discovering fundamental patterns and concealed relationships systematically from valuable information within the data to visualize and model interrelationship of the data itself are known as data mining process [17].…”
Section: IImentioning
confidence: 99%
“…Procedure of discovering fundamental patterns and concealed relationships systematically from valuable information within the data to visualize and model interrelationship of the data itself are known as data mining process [17]. Clustering and classification are common data mining algorithms and widely discovered and employed within the field of intrusion detection [6], [18], [19].…”
Section: IImentioning
confidence: 99%
See 1 more Smart Citation