2012
DOI: 10.1007/978-3-642-30507-8_13
|View full text |Cite
|
Sign up to set email alerts
|

Unsupervised Clustering Approach for Network Anomaly Detection

Abstract: Abstract. This paper describes the advantages of using the anomaly detection approach over the misuse detection technique in detecting unknown network intrusions or attacks. It also investigates the performance of various clustering algorithms when applied to anomaly detection. Five different clustering algorithms: k-Means, improved k-Means, k-Medoids, EM clustering and distance-based outlier detection algorithms are used. Our experiment shows that misuse detection techniques, which implemented four different … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
73
0
3

Year Published

2013
2013
2024
2024

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 144 publications
(76 citation statements)
references
References 12 publications
0
73
0
3
Order By: Relevance
“…In several review papers [26][27][28][29][30][31][32] various network anomaly detection methods have been summarized. From aforementioned surveys one can find that the most effective methods of network anomaly detection are Principle Component Analysis [33][34][35], Wavelet analysis [36][37][38], Markovian models [39,40], Clustering [41][42][43], Histograms [44,45], Sketches [46,47], and Entropies [8,15,48].…”
Section: General Overview Of Network Anomaly Techniquesmentioning
confidence: 99%
“…In several review papers [26][27][28][29][30][31][32] various network anomaly detection methods have been summarized. From aforementioned surveys one can find that the most effective methods of network anomaly detection are Principle Component Analysis [33][34][35], Wavelet analysis [36][37][38], Markovian models [39,40], Clustering [41][42][43], Histograms [44,45], Sketches [46,47], and Entropies [8,15,48].…”
Section: General Overview Of Network Anomaly Techniquesmentioning
confidence: 99%
“…[30] achieved 99.63% detection rate and the false alarm rate is 0.34%. Iwan Syarif et al [42] has achieved detection rate is 99.56% and the false alarm rate of 0.40% in the year 2012. …”
Section: Comprehensive Analysis and Discussionmentioning
confidence: 99%
“…In the very next year in 2012, Iwan Syarif et al [42] have illustrated the compensation of utilizing the variance detection approach over the mishandling detection technique in detecting unknown network intrusions or attacks. When applied to anomaly detection it also examined the presentation of different grouping algorithms.…”
Section: International Journal Of Computer Applications (0975 -8887) mentioning
confidence: 99%
“…The idea behind this technique is that the amount of normal connection data is usually overwhelmingly larger than that of intrusions [5]. Whenever this assumption holds, the anomalies and attacks can be detected based on cluster sizes, i.e, large clusters correspond to normal data, and the rest of the data points, which are outliers, correspond to attacks [19].…”
Section: The Clustering Algorithm Ad-clustmentioning
confidence: 99%
“…Moreover, the number of clusters dependency and the degeneracy constitute the drawbacks that hamper the use of K-means for anomaly detection [15]. In this respect, the AD-Clust algorithm combines two prominent categories of clustering, namely: distance-based [19] as well as density-based [8]. It exploits the advantages of the one to palliate the limitations of the other and vice versa.…”
Section: The Clustering Algorithm Ad-clustmentioning
confidence: 99%