Using Clustering To Capture Attackers

Shetty, Nisha P (2016) Using Clustering To Capture Attackers. In: International Conference on Inventive Computation Technologies, 26/08/2016, Coimbatore.

[img] PDF
285.pdf - Published Version
Restricted to Registered users only

Download (383kB) | Request a copy


As the attackers nowadays are getting craftier it is deemed important to have a security system which is easy to maintain and economically affordable and gives suitable defense against attacks both known and novel .In this paper, the concept of genetic programming is applied to recreate open network conditions, using records obtained from KDD Cup ’99 dataset. Then the newly created records (network log headers) are assimilated in normal and attack categories using the basic fundamental of clustering i.e. intra-cluster similarity and intercluster dissimilarity. Finally results of two prominent partition based clustering approaches i.e. K-Means and K-Medoid are compared and evaluated.

Item Type: Conference or Workshop Item (Paper)
Uncontrolled Keywords: Intrusions, K-Means, K-Medoid, Genetic algorithm, Accuracy, Intrusion Detection System
Subjects: Engineering > MIT Manipal > Information and Communication Technology
Depositing User: MIT Library
Date Deposited: 20 Oct 2016 15:04
Last Modified: 20 Oct 2016 15:04

Actions (login required)

View Item View Item