2013
DOI: 10.5121/ijcnc.2013.5514
|View full text |Cite
|
Sign up to set email alerts
|

Visualize Network Anomaly Detection by Using K-Means Clustering Algorithm

Abstract: With the ever increasing amount of new attacks in today's world the amount of data will keep increasing, and because of the base-rate fallacy the amount of false alarms will also increase. Another problem with detection of attacks is that they usually isn't detected until after the attack has taken place, this makes defending against attacks hard and can easily lead to disclosure of sensitive information.In this paper we choose K-means algorithm with the Kdd Cup 1999 network data set to evaluate the performanc… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2014
2014
2023
2023

Publication Types

Select...
3
3
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 11 publications
(6 citation statements)
references
References 16 publications
0
6
0
Order By: Relevance
“…In several review papers [26][27][28][29][30][31][32] various network anomaly detection methods have been summarized. From aforementioned surveys one can find that the most effective methods of network anomaly detection are Principle Component Analysis [33][34][35], Wavelet analysis [36][37][38], Markovian models [39,40], Clustering [41][42][43], Histograms [44,45], Sketches [46,47], and Entropies [8,15,48].…”
Section: General Overview Of Network Anomaly Techniquesmentioning
confidence: 99%
“…In several review papers [26][27][28][29][30][31][32] various network anomaly detection methods have been summarized. From aforementioned surveys one can find that the most effective methods of network anomaly detection are Principle Component Analysis [33][34][35], Wavelet analysis [36][37][38], Markovian models [39,40], Clustering [41][42][43], Histograms [44,45], Sketches [46,47], and Entropies [8,15,48].…”
Section: General Overview Of Network Anomaly Techniquesmentioning
confidence: 99%
“…Multi layer perceptrons has also been proposed for network intrusion detection [40]. Finally, K-means can be found in outlier detection problems like mammogram classification [44] as well as network anomaly detection [45].…”
Section: Related Workmentioning
confidence: 99%
“…Using Weighted-Euclidean distance function in [14], anomaly detection techniques is proposed for traffic-anomaly detection. In [15], the authors have evaluated performance of k-means clustering-based anomaly detection method using KDD Cup 1999 network dataset. Although a few works have already been completed in this line, most of the aforesaid techniques considered the dataset with numeric attributes.…”
Section: Of 18mentioning
confidence: 99%