VISUALIZE NETWORK ANOMALY DETECTION BY USING K-MEANS CLUSTERING ALGORITHM
|
|
|
- Ellen Booth
- 10 years ago
- Views:
Transcription
1 VISUALIZE NETWORK ANOMALY DETECTION BY USING K-MEANS CLUSTERING ALGORITHM A. M. Riad 1, Ibrahim Elhenawy 2,Ahmed Hassan 3 and Nancy Awadallah 1 1Faculty of Computer Science and Information Systems, Mansoura University, Egypt [email protected] [email protected] 2Faculty of Computer Science and Information Systems,Zagazig University, Egypt [email protected] ABSTRACT 3Faculty of Engineering Mansoura University, Egypt [email protected] With the ever increasing amount of new attacks in today s world the amount of data will keep increasing, and because of the base-rate fallacy the amount of false alarms will also increase. Another problem with detection of attacks is that they usually isn t detected until after the attack has taken place, this makes defending against attacks hard and can easily lead to disclosure of sensitive information. In this paper we choose K-means algorithm with the Kdd Cup 1999 network data set to evaluate the performance of an unsupervised learning method for anomaly detection. The results of the evaluation showed that a high detection rate can be achieve while maintaining a low false alarm rate.this paper presents the result of using k-means clustering by applying Cluster 3.0 tool and visualized this result by using TreeView visualization tool. KEYWORDS Intrusion detection, Clustering, K-means, Kdd Cup 99, Cluster 3.0, Visualization, TreeView INTRODUCTION Network Intrusion Detection System (NIDS) is one that scans the network activities in a computer environment,and detect the intrusions or attacks. Then, the system administrator may be alerted to the take the corrective actions. Network intrusion detection approaches are : signature-based and anomaly detection. The oldest method in practice is the signature-based method which depends on a signature database of previously known attacks. A model-based supervised method is misuse detection which trains a classifier with labeled patterns to classify new unlabeled patterns. To detect abnormal behaviors in patterns, anomaly detection approaches can make use of supervised or unsupervised methods. [1] Intrusion detection evaluation problem and its solution usually affect the choice of the suitable intrusion detection system for a particular environment depending on several factors. The false alarm rate and the detection rate are the most DOI : /ijcnc
2 basic of these factors; they are calculated from the main four instances True Positive (TP), True Negative (TN), False Positive(FP) and False Negative (FN).[22] Grouping objects into meaningful subclasses is clustering method. For classifying log data and detecting intrusions, clustering methods can be useful. The most important unsupervised learning process in data mining is clustering, it used to find the structures or patterns in a collection of unlabeled data. There are two main types of clustering algorithms,it can be categorized into: partitioning algorithm, hierarchical algorithm. Four major categories of attacks are found on KDD dataset : Probing attacks (information gathering attacks), Denial of-service (DoS) attacks (deny legitimate requests to a system), user-to-root (U2R) attacks (unauthorized access to local super-user or root), and remote-tolocal (R2L) attacks (unauthorized local access from a remote machine). Each labeled record in KDD dataset is consisted of 41 attributes (features) and one target value. [20] Section 2 presents researcher s previous studies in this field, section 3. Presents clustering methods, section 4 describes k-means algorithm, section 5 describes KDD cup 99 dataset and section 6. Presents proposed work.. The paper presents the result of using k-means clustering algorithms by using Cluster 3.0 tool and visualized this result by using TreeView visualization tool. 2. RELATED WORK Jose F. Nieves, presented a comparative study with more emphasis on the unsupervised learning methods for anomaly detection. K-means algorithm with KDD Cup 1999 network data set are used to evaluate the performance of an unsupervised learning method for anomaly detection. High detection rate can be achieve while maintaining a low false alarm rate is the results of this work evaluation.[1] L. Portnoy et all, presented clustering-based intrusion detection algorithm, which trains on unlabeled data in order to detect new intrusions. Different types of intrusions are detect by their method, while a low false positive rate is maintained as verified over the KDD CUP 1999 dataset.[2] E.Eskin et all, presented algorithms that are designed to process unlabeled data,they presented a new geometric framework for unsupervised anomaly detection. [3] K. Nyarko et all, presented network visualization techniques for intrusion detection on small and large-scale networks. They showed that haptic technologies can provide another dimension of information critical to the efficient visualization of network intrusion data. [4] K.Labib, V. Vemuri, presented the S Language as a tool for the implementation of intrusion detection systems. Anomaly-based detection selected the two type of attacks such as Denial-Of- Service (DoS) and Network Probe attacks are schemed for detecting from the 1998 DARPA. [5] 196
3 P. Ren et all, presented IDGraphs as an interactive visualization system for intrusion detection. using the Histographs technique is used to summarize a stack of thousands of these traces, which maps data frequency at each pixel to brightness. [6][26][27][28][30][31][32] P. Laskov et all, presented a new technique for visualization of anomaly detection based on prediction sensitivity. Its application enables an expert (a) to interpret the predictions made by anomaly detection and (b) to select informative features in order to improve detection accuracy. [7] A. Mitrokotsa, C. Douligeris, proposed an approach that detects Denial of Service attacks using Emergent Self-Organizing Maps. The approach is based on classifying normal traffic against abnormal traffic in the sense of Denial of Service attacks. The approach permits the automatic classification of events that are contained in logs and visualization of network traffic. Extensive simulations show the effectiveness of this approach compared to previously proposed approaches regarding false alarms and detection probabilities. [8] J. Peng et all, presented a hybrid intrusion detection and visualization system that influence the advantages of signature-based and anomaly detection methods. When intrusion is detected it is protecting the system from internal and external attacks and autonomous agents will automatically take actions against misuse and abuse of computer system. [9] X.Cui et all, the swarm based visual data mining approach (SVDM) is a technique developed to help user gain insight into the alert event data of the intrusion detection system. The SVDM can help administrators detect anomaly behaviors of malicious user. The output visual representation exploits the ability to recognize patterns and utilizes it to help security administrators understand the relationship between the discrete security breaches. [10] A.Frei, M. Rennhard, proposed Histogram Matrix (HMAT) which is a novel log file visualization technique. It visualizes the content of a log file to enable administrator to spot anomalies. The system uses a combination of graphical and statistical techniques and allows even non-experts to interactively search for anomalous log messages. The system allows to automatically generating security events if an anomaly is detected. Researchers introduced HMAT, demonstrate its functionality using log files from a variety of services in real environments, and identify strengths and limitations of the technique. [11] L. Dongxia and Z. Yongbo, an intrusion detection module based on honeypot technology presented are presented,which utilizes IP Traceback technique. By using honeypot technology, this module traces the intrusion source farthest.[12] M. Jianliang et all, K-means algorithm to cluster and analyze the data of KDD-99 dataset. This algorithm can detect unknown intrusions in the real network connections. The simulations results that run on KDD-99 data set showed that the K-means method is an effective algorithm for partitioning large data set. [13] B. K. Kumar and A. Bhaskar, presented an approach for identifying network anomalies by visualizing network flow data which is stored in weblogs. Various clustering techniques can be used to identify different anomalies in the network. Here, they present a new approach based on 197
4 simple K-Means for analyzing network flow data using different attributes like IP address, Protocol, Port number etc. to detect anomalies. By using visualization, they can identify which sites are more frequently accessed by the users. In their approach they provide overview about given dataset by studying network key parameters. In this process they used preprocessing techniques to eliminate unwanted attributes from weblog data [14]. 3. CLUSTERING METHODS The task of cluster analysis is grouping a set of objects in a way that objects in the same group which called (cluster) are more similar to each other than to those in other groups (clusters). Clustering algorithms fall into two categories hierarchical and partitioning algorithms. A. Hierarchical Algorithms: In this type of clustering data are not gets clustered at ones instead stepwise procedures is followed for clustering the datasets. [1] Hierarchical clustering can be classified as: - Division clustering Whole data point is considered as a single cluster and formation of new clusters starts from the whole data point to single datapoint. It starts form root to leave. - Agglomerative Clustering Formation of the clusters starts by combining two instances based upon the certain criteria. It starts form leave to root. [5][16] B. Partitioning Algorithms: It divides the data set into k clusters, where the integer k needs to be specified. The algorithm is run for a range of k values. - K-Mean Clustering In this method, assignment of the data points to clusters is depending upon the distance between cluster centroid and data point. There are three variation of k-mean clustering, k-mean: which is used for numerical data sets, k-mediod : which is used for categorical datasets and k-prototype: is used for numerical and categorical dataset.[1][16] 198
5 - Fuzzy C Mean Clustering This algorithm concerned with the distance calculation, membership of the data points with the cluster are also considered.[15] - QT Clustering It groups datapoint into clusters. By finding large cluster whose diameter does not exceed a given user-defined diameter threshold value the quality is ensured. [16] 4. K-MEANS CLUSTERING The observations in this algorithm are classified as belonging to one of k groups. By calculating the centroid for each group and assigning each observation to the group with the closest centroid Group membership is determined. Number of cluster centers is choosed to minimize the within-class sum of squares of the vectors for those centers. K-means algorithm uses Euclidean distance. The general steps for the K-means algorithm were the following: 1. Number of clusters (K) are choosed 2. Centroids Initialization 3. Each pattern Assigned to the cluster with closest centroid 4. Means of each cluster is calculate to be its new centroid 5. Repeat step 3 until stopping criteria is met 6. The best clustering solution was chosen after repeating this procedure 10 times. [1][13] Start Number of cluster K Centroid - No object move groups + End Distance objects to centroids Grouping based on minimum distance Figure 1. K-means clustering process [17] 199
6 4.1 Distance Calculation A distance function is required to compute the distance between two objects. The Euclidean is the most commonly used distance function, it is one which is defined as: Formula m 2 d( x, y) = ( x i y i ) (1) i= 1 In previous equation two input vectors are with m quantitative features where x = (x1;:; xm) and y = (y1;:; ym).in the Euclidean distance function, all features contribute equally to the function value. 5. KDD CUP 99 DESCRIPTION DATASET The KDD-99 (Knowledge Discovery in Databases) [18] dataset is a standard set of data that can be used in order to evaluate proposed approaches in the area of intrusion detection. Four major categories of attacks found in KDD dataset are: Probing attacks which related to (information gathering attacks), the attack (deny legitimate requests to a system) is Denial-of-Service (DoS) attacks user-to-root (U2R) attacks (unauthorized access to local super-user or root), and remote-to-local (R2L) attacks (unauthorized local access from a remote machine) [8][19]. KDD dataset is composed of labeled and unlabeled records. Each labeled record consisted of 41 attributes (features) which are: Fundamental Properties: the basic properties are obtained from differential of packet without the investigation of useful load for transmission. Content: knowledge in this case is used for evaluation of useful load for transmission in TCP packets and involves failed attempts to log in system. Traffic property based on time: these features are designed to get properties that are happened in more than two seconds continuously. A sample of these features shows the number of connections to the host. Traffic property based on the host: It uses historical window to estimate the number of connections instead of time. Also, it is designed to assess the extent attacks that are happened in more than two seconds. In international knowledge discovery and data mining only 10% KDD of dataset is used for training purposes. [20] 6. VISUALIZE INTRUSION DETECTION USING K-MEANS CLUSTERING In previous sections the clustering techniques are presented such as K-Means,also the KDD dataset and its features are explained.in this section, the proposed work is presented; it will improve and comprehend the result of clustering technique through visualization. 200
7 The proposed work contains 3 stages after entering corrected KDD dataset. The first stage is to fragment the 37 attacks which are founded in this dataset into four general categories (DOS, Probe, R2L, and U2R). The second stage is to use Cluster 3.0 tool for apply k-means technique to cluster attacks. And last stage is to use TreeView visualization tool to visualize k-means result. Input the correctedkdd dataset Fragment dataset into 4 attacks sub-datasets Apply K-means by using Cluster 3.0 tool Visualize clustering data by using Treeview tool Clustering of attacks 6.1 KDD Fragmentation Figure 2. : Architecture of the proposed system The KDD cup 99 intrusion detection consists of three components, which are detailed in Table 1. There are only 22 attack types in 10% KDD dataset and they are mostly of denial of service category. different statistical distributions in Corrected KDD dataset compared to 10% KDD or Whole KDD. It contains 37 types of attacks. Table 1 gives number of records in each attack category. [22][23] TABLE 1. THE KDD 99 Intrusion Detection Datasets Characteristics In Terms of Number Of Samples [22][23] Dataset DoS Probe U2R R2L Normal 10%KDD CorrectedKDD WholeKDD
8 The KDD Cup 1999 data contains a wide variety of intrusions.each sample in the data is a record of extracted features from a network connection gathered during the simulated intrusions. [33] A connection is a sequence of TCP packets to and from various IP addresses. A connection record consists of 41 fields. Basic features about TCP connection as duration, protocol type, number of bytes transferred, domain specific features as number of file creation, number of failed login attempts, and whether root shell was obtained. [33] The Corrected KDD is used for proposed experiment. There are 37 types of attacks (as showed in figure 4) in the dataset which are classified into four categories (Probe, Dos, U2R, R2L) are shown in Table 2. TABLE 2. Attack Types With Their Corresponding Categories [23] Category Probe DoS U2R Types Of Attack Satan, nmap, portsweep, mscan, ipsweep, saint udpstorm apache, mailbomb, back, neptune,land, smurf, teardrop, processtable, pod xterm,buffer_overflow, rootkit, ps, loadmodule, perl, sqlattack, R2L Httptunnel, ftp_write, worm, imap, xlock, multihop, warezmaster, named, snmpguess, phf,, snmpgetattack, xsnoop, guess_password,sendmail Figure 3.: The 37 types of Attack founded in corrected KDD In the next figure the classification of 37 attack types into four categories (DoS, Probe, U2R, R2L).Figure 3.,4. are extracted from RapidMiner program. 202
9 Figure 4: Bar stacked between Class and Attack name 6.2 Apply K-means by Using Cluster 3.0 tool The following criteria were used: detection rate and false alarm rate. The number of attacks detected divided by the total number of attacks is defined as (detection rate). The number of 'normal' patterns classify s attacks divided by the total number of 'normal' patterns is defined as (false alarm rate). [1] The number of malicious correctly classified as malicious: True Positives (TP); The number of benign programs correctly classified as benign is called: True Negatives (TN); The number of benign programs falsely classified as malicious is called: False Positives (FP); The number of malicious falsely classified as benign is called: False Negative (FN) [21] May be defines as follows: Detection Rate (DTR) = TP / (TP + TN) [24] False Alarm Rate (FPR) = FP / (TN + FP) [21][25] The total number of normal patterns: The total number of 'attacks' patterns: The total number of all detection:
10 TABLE 3. Experiment Results Of K-Means Clustering Technique DOS Probe U2R R2L K-Means K=4 K-Means K=5 K-Means K=6 Detection rate False Alarm Detection rate False Alarm Detection rate False Alarm The experiment results show that K-means when k=4 is the best as detection rate is high and false alarm rate is less than others. The next figure illustrates the detection rate and false alarm for the four categories of attacks (DOS, Probe, R2L, U2R) with different clusters (k=4, 5, 6) Cluster 3.0 tool Figure 5. : Detection Rate & False Alarm with different K clusters To provide a computational and graphical environment for analyzing data from genomic datasets Cluster and TreeView programs are used. Organizing and analyzing the data in a number of different ways is the responsibility of Cluster program. To allow the organized data to be visualized and browsed TreeView program is used. [34] Load data file option under the File menu is used for loading data to be into Cluster. The functions that provided for adjusting and filtering the loaded data are accessed via the Filter Data and Adjust Data tabs. 204
11 Figure 6: Using K-means in Cluster 3.0 tool In the previous figure illustrated how K-means clustering implemented in Cluster 3.0 allows any of the eight distance measures to be used; it had recommended using the Euclidean distance or city-block distance instead of the distance measures based on the Pearson correlation. To use k- means clustering with a distance measure based on the Pearson correlation, Researcher in this experiment first normalize the data appropriately (using the "Adjust Data" tab) before running the k-means algorithm. Cluster 3.0 tool deals with attached data, applying k-means technique for clustering. This tool enables users to choose the number of clusters which are (4) clusters, and the numbers of runs which are (100). Also similarity metric which be used is Euclidean distance function which illustrated in section 4.1. An assignment of items to a cluster is the output simply. The output data file is new-featureattacks-count-percentage_kg4_a4.cdt, where _KG4 point to items were organized, and _A4 point to arrays were organized. 205
12 6.3 Visualize Clustering Data by Using TreeView Tool After applying k-means algorithm by using clustering tool which called (Cluster 3.0), the result will be entered to TreeView program to visualize clustering data. TreeView is a program for viewing the results of expression clustering performed by the associated program Cluster 3.0. TreeView reads in matching *.CDT and *.GTR files produced by Cluster 3.0. A thumbnail image is generated along with a view of the tree. The next figure illustrated TreeView visualization tool result. Figure 7: Visualized clustering data via TreeView This tool working with the result of k-means technique which be extracted from Cluster 3.0 tool new-feature-attacks-count-percentage_kg4_a4.cdt.there are general four attacks categories (DOS, Probe, R2L, and U2R) visualized from applying. 206
13 7. CONCLUSION In this paper we presented an approach for visualizing network attacks data using clustering. It is an easy, simple and fast way of analyzing the flow data. By the help of clustering we can predict the type of flow i.e. attacks or normal by performing some clustering on the particular attributes. We present the K-means algorithm for intrusion detection and apply it by using Cluster 3.0. Results on a subset of KDD-99 dataset showed accuracy of the algorithm. To visualize clustering data we use TreeView visualization tool. ACKNOWLEDGEMENTS The authors would like to thank all the people and institutions that have allowed them to use many of the figures present in this paper. REFERENCES [1] J. F. Nieves,"Data Clustering for Anomaly Detection in Network Intrusion Detection ",Research Alliance in Math and Science, August, pp.1-12, [2] L. Portnoy, E. Eskin, S. Stolfo, " Intrusion detection with unlabeled data using clustering", In Proceedings of ACM CSS Workshop on Data Mining Applied to Security (DMSA-2001), Philadelphia, PA,USA,2001. [3] E.Eskin, A.Arnold,, M. Prerau, L.Portnoy, S. Stolfo, "A geometric framework for unsupervised anomaly detection: Detecting intrusions in unlabeled data", Applications of Data Mining in Computer Security(2002), Norwell, MA, USA, Dec., pp ,2002. [4] K. Nyarko, T. Capers, C. Scott, K. Ladeji-Osias, Network Intrusion Visualization with NIVA, an Intrusion Detection Visual Analyzer with Haptic Integration, IEEE, [5] K.Labib, V. R. Vemuri, "Anomaly Detection Using S Language Framework: Clustering and Visualization of Intrusive Attacks on Computer Systems". Fourth Conference on Security and Network Architectures, SAR'05, Batz sur Mer, France, June 2005 [6] P. Ren, Y. Gao, Z. Li, Y. Chen and B. Watson, IDGraphs: Intrusion Detection and AnalysisUsing Histographs,IEEE, [7] P. Laskov, K. Rieck, C. Schäfer, K.R. Müller, Visualization of anomaly detection using prediction sensitivity, Proc.of Sicherheit, April 2005, [8] A. Mitrokotsa, C. Douligeris, Detecting Denial of Service Attacks Using Emergent Self-Organizing Maps, Signal Processing and Information Technology, Proceedings of the Fifth IEEE International Symposium, pp ,IEEE,2005. [9] J. Peng, C. Feng, J.W. Rozenblit, A Hybrid Intrusion Detection and Visualization System, Engineering of Computer Based Systems, ECBS th Annual IEEE International Symposium and Workshop,, pp. 506, IEEE,2006. [10] X.Cui, J.Beaver, T. Potok and L.Yang, Visual Mining Intrusion Behaviors by Using Swarm Technology, System Sciences (HICSS), th Hawaii International Conference, pp. 1 7, IEEE [11] A.Frei, M. Rennhard, Histogram Matrix: Log File Visualization for Anomaly Detection, IEEE, [12] L. Dongxia, Z. Yongbo, An Intrusion Detection System Based on Honeypot Technology,Computer Science and Electronics Engineering (ICCSEE), 2012 International Conference on IEEE, Vol.1,
14 [13] M. Jianliang, S. Haikun, B. Ling, "The Application on Intrusion Detection Based on K-means Cluster Algorithm", IFITA '09 Proceedings of the 2009 International Forum on Information, Technology and Applications Vol.1,pp ,IEEE,2009. [14] B. K. Kumar, A. Bhaskar, Identifying Network Anomalies Using Clustering Technique in Weblog Data, International Journal of Computers & Technology, Vol. 2 No. 3, June, [15] S. Akbar, K.Nageswara Rao, J.A.Chandulal," Intrusion Detection System Methodologies Based on Data Analysis",International Journal of Computer Applications,Vol. 5, No.2, August [16] K.Bharti, S. Shukla, S. Jain,"Intrusion detection using clustering", IJCCT, Vol.1, 2010 [17] S.Jain, M. Aalam, M.Doja, K-means clustering using weka interface, Proceedings of the 4th National Conference; INDIACom, Computing For Nation Development, [18] The Third International Knowledge Discovery and Data Mining Tools Competition, May 2002,Available from [19] M. Sabhnani,G. Serpen, Application of Machine Learning Algorithms to KDD Intrusion Detection Dataset within Misuse Detection Context, In Proceedings of the International Conference on Machine Learning, Models, Technologies and Applications (MLMTA 2003), Vol. 1, (2003). [20] F.S.Gharehchopogh, Neda Jabbari, Zeinab Ghaffari Azar, Evaluation of Fuzzy K-Means And K- Means Clustering Algorithms In Intrusion Detection Systems, International Journal of Scientific & Technology Research,Vol. 1, issue 11, December [21] M. E. Elhamahmy, H. N. Elmahdy, I. A. Saroit,"A New Approach for Evaluating Intrusion Detection System", International Journal of Artificial Intelligent Systems and Machine Learning, Vol. 2, No 11, November [22] Dr.S.Siva Sathya, Dr. R.Geetha Ramani and K.Sivaselvi. "Discriminant Analysis based Feature Selection in KDD Intrusion Dataset ", International Journal of Computer Applications 31(11):1-7, October [23] P. G.Jeya, M. Ravichandran and C. S. Ravichandran," Efficient Classifier for R2L and U2R Attacks. International Journal of Computer Applications 45(21):29-32, May [24] F. N. M. Sabri, N. M.Norwawi, K. Seman," "Identifying False Alarm Rates for Intrusion Detection System with Data Mining", International Journal of Computer Science and Network Security, VOL. 11 No. 4, April 2011 [25] P. Divya, R. Priya," Clustering Based Feature Selection and Outlier Analysis ",International Journal of Computer Science & Communication Networks, Vol 2(6), pg [26] C.Ahlberg, B. Shneiderman, Visual information seeking: tight coupling of dynamic query filters with starfield displays, In proceeding of: Conference on Human Factors in Computing Systems, CHI 1994, Boston, Massachusetts, USA, pp ,April 24-28, [27] S. Noel, M. Jacobs, P. Kalapa, S. Jajodia Multiple Coordinated Views for Network Attack Graphs, Visualization for Computer Security,.(VizSEC 05). IEEE Workshop on, ,2005 [28] Displaying_and_Navigating_Large_Information_Spaces [29] [30] [31] [32] [33] Ms. P. K. Karmore and MS. S. T. Bodkhe,"A Survey on Intrusion in Ad Hoc Networks and its Detection Measures", International Journal on Computer Science and Engineering (IJCSE),3(5),pp ,May [34] - Last visiting at
Intrusion Detection using Artificial Neural Networks with Best Set of Features
728 The International Arab Journal of Information Technology, Vol. 12, No. 6A, 2015 Intrusion Detection using Artificial Neural Networks with Best Set of Features Kaliappan Jayakumar 1, Thiagarajan Revathi
Performance Evaluation of Intrusion Detection Systems using ANN
Performance Evaluation of Intrusion Detection Systems using ANN Khaled Ahmed Abood Omer 1, Fadwa Abdulbari Awn 2 1 Computer Science and Engineering Department, Faculty of Engineering, University of Aden,
STUDY OF IMPLEMENTATION OF INTRUSION DETECTION SYSTEM (IDS) VIA DIFFERENT APPROACHS
STUDY OF IMPLEMENTATION OF INTRUSION DETECTION SYSTEM (IDS) VIA DIFFERENT APPROACHS SACHIN MALVIYA Student, Department of Information Technology, Medicaps Institute of Science & Technology, INDORE (M.P.)
HYBRID INTRUSION DETECTION FOR CLUSTER BASED WIRELESS SENSOR NETWORK
HYBRID INTRUSION DETECTION FOR CLUSTER BASED WIRELESS SENSOR NETWORK 1 K.RANJITH SINGH 1 Dept. of Computer Science, Periyar University, TamilNadu, India 2 T.HEMA 2 Dept. of Computer Science, Periyar University,
An analysis of suitable parameters for efficiently applying K-means clustering to large TCPdump data set using Hadoop framework
An analysis of suitable parameters for efficiently applying K-means clustering to large TCPdump data set using Hadoop framework Jakrarin Therdphapiyanak Dept. of Computer Engineering Chulalongkorn University
Neural networks vs. decision trees for intrusion detection
Neural networks vs. decision trees for intrusion detection Yacine Bouzida Mitsubishi Electric ITE-TCL 1, allée de Beaulieu CS 186 3578, Rennes, France [email protected] Frédéric Cuppens Département
Using Rough Set and Support Vector Machine for Network Intrusion Detection System Rung-Ching Chen and Kai-Fan Cheng
2009 First Asian Conference on Intelligent Information and Database Systems Using Rough Set and Support Vector Machine for Network Intrusion Detection System Rung-Ching Chen and Kai-Fan Cheng Ying-Hao
How To Prevent Network Attacks
Ali A. Ghorbani Wei Lu Mahbod Tavallaee Network Intrusion Detection and Prevention Concepts and Techniques )Spri inger Contents 1 Network Attacks 1 1.1 Attack Taxonomies 2 1.2 Probes 4 1.2.1 IPSweep and
Network Intrusion Detection Systems
Network Intrusion Detection Systems False Positive Reduction Through Anomaly Detection Joint research by Emmanuele Zambon & Damiano Bolzoni 7/1/06 NIDS - False Positive reduction through Anomaly Detection
Data Clustering for Anomaly Detection in Network Intrusion Detection
Data Clustering for Anomaly Detection in Network Intrusion Detection Jose F. Nieves Polytechnic University of Puerto Rico Research Alliance in Math and Science Dr. Yu (Cathy) Jiao Applied Software Engineering
Euclidean-based Feature Selection for Network Intrusion Detection
2009 International Conference on Machine Learning and Computing IPCSIT vol3 (2011) (2011) IACSIT Press, Singapore Euclidean-based Feature Selection for Network Intrusion Detection Anirut Suebsing, Nualsawat
International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2163 Volume 1 Issue 11 (November 2014)
Denial-of-Service Attack Detection Mangesh D. Salunke * Prof. Ruhi Kabra G.H.Raisoni CEM, SPPU, Ahmednagar HOD, G.H.Raisoni CEM, SPPU,Ahmednagar Abstract: A DoS (Denial of Service) attack as name indicates
A Review of Anomaly Detection Techniques in Network Intrusion Detection System
A Review of Anomaly Detection Techniques in Network Intrusion Detection System Dr.D.V.S.S.Subrahmanyam Professor, Dept. of CSE, Sreyas Institute of Engineering & Technology, Hyderabad, India ABSTRACT:In
AUTONOMOUS NETWORK SECURITY FOR DETECTION OF NETWORK ATTACKS
AUTONOMOUS NETWORK SECURITY FOR DETECTION OF NETWORK ATTACKS Nita V. Jaiswal* Prof. D. M. Dakhne** Abstract: Current network monitoring systems rely strongly on signature-based and supervised-learning-based
Developing a hybrid method of Hidden Markov Models and C5.0 as a Intrusion Detection System
, pp.165-174 http://dx.doi.org/10.14257/ijdta.2013.6.5.15 Developing a hybrid method of Hidden Markov Models and C5.0 as a Intrusion Detection System Mahsa Khosronejad, Elham Sharififar, Hasan Ahmadi Torshizi
Using Jquery with Snort to Visualize Intrusion
www.ijcsi.org 486 Using Jquery with Snort to Visualize Intrusion Alaa El - Din Riad 1, Ibrahim Elhenawy 2, Ahmed Hassan 3 and Nancy Awadallah 4 1 Vice Dean for Students Affairs, Faculty of Computer Science
USING ROUGH SET AND SUPPORT VECTOR MACHINE FOR NETWORK INTRUSION DETECTION
USING ROUGH SET AND SUPPORT VECTOR MACHINE FOR NETWORK INTRUSION DETECTION Rung-Ching Chen 1, Kai-Fan Cheng 2 and Chia-Fen Hsieh 3 1 Department of Information Management Chaoyang University of Technology
Detection. Perspective. Network Anomaly. Bhattacharyya. Jugal. A Machine Learning »C) Dhruba Kumar. Kumar KaKta. CRC Press J Taylor & Francis Croup
Network Anomaly Detection A Machine Learning Perspective Dhruba Kumar Bhattacharyya Jugal Kumar KaKta»C) CRC Press J Taylor & Francis Croup Boca Raton London New York CRC Press is an imprint of the Taylor
A new Approach for Intrusion Detection in Computer Networks Using Data Mining Technique
A new Approach for Intrusion Detection in Computer Networks Using Data Mining Technique Aida Parbaleh 1, Dr. Heirsh Soltanpanah 2* 1 Department of Computer Engineering, Islamic Azad University, Sanandaj
KEITH LEHNERT AND ERIC FRIEDRICH
MACHINE LEARNING CLASSIFICATION OF MALICIOUS NETWORK TRAFFIC KEITH LEHNERT AND ERIC FRIEDRICH 1. Introduction 1.1. Intrusion Detection Systems. In our society, information systems are everywhere. They
Analysis of KDD CUP 99 Dataset using Clustering based Data Mining
, pp.23-34 http://dx.doi.org/10.14257/ijdta.2013.6.5.03 Analysis of KDD CUP 99 Dataset using Clustering based Data Mining Mohammad Khubeb Siddiqui and Shams Naahid College of Computer Engineering and Sciences,
A Survey on Intrusion Detection System with Data Mining Techniques
A Survey on Intrusion Detection System with Data Mining Techniques Ms. Ruth D 1, Mrs. Lovelin Ponn Felciah M 2 1 M.Phil Scholar, Department of Computer Science, Bishop Heber College (Autonomous), Trichirappalli,
ANALYSIS OF PAYLOAD BASED APPLICATION LEVEL NETWORK ANOMALY DETECTION
ANALYSIS OF PAYLOAD BASED APPLICATION LEVEL NETWORK ANOMALY DETECTION Like Zhang, Gregory B. White Department of Computer Science, University of Texas at San Antonio [email protected], [email protected]
The Integration of SNORT with K-Means Clustering Algorithm to Detect New Attack
The Integration of SNORT with K-Means Clustering Algorithm to Detect New Attack Asnita Hashim, University of Technology MARA, Malaysia April 14-15, 2011 The Integration of SNORT with K-Means Clustering
Conclusions and Future Directions
Chapter 9 This chapter summarizes the thesis with discussion of (a) the findings and the contributions to the state-of-the-art in the disciplines covered by this work, and (b) future work, those directions
Efficient Security Alert Management System
Efficient Security Alert Management System Minoo Deljavan Anvary IT Department School of e-learning Shiraz University Shiraz, Fars, Iran Majid Ghonji Feshki Department of Computer Science Qzvin Branch,
An Anomaly-Based Method for DDoS Attacks Detection using RBF Neural Networks
2011 International Conference on Network and Electronics Engineering IPCSIT vol.11 (2011) (2011) IACSIT Press, Singapore An Anomaly-Based Method for DDoS Attacks Detection using RBF Neural Networks Reyhaneh
Hybrid Intrusion Detection System Model using Clustering, Classification and Decision Table
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 9, Issue 4 (Mar. - Apr. 2013), PP 103-107 Hybrid Intrusion Detection System Model using Clustering, Classification
Development of a Network Intrusion Detection System
Development of a Network Intrusion Detection System (I): Agent-based Design (FLC1) (ii): Detection Algorithm (FLC2) Supervisor: Dr. Korris Chung Please visit my personal homepage www.comp.polyu.edu.hk/~cskchung/fyp04-05/
A survey on Data Mining based Intrusion Detection Systems
International Journal of Computer Networks and Communications Security VOL. 2, NO. 12, DECEMBER 2014, 485 490 Available online at: www.ijcncs.org ISSN 2308-9830 A survey on Data Mining based Intrusion
International Journal of Computer Science Trends and Technology (IJCST) Volume 3 Issue 3, May-June 2015
RESEARCH ARTICLE OPEN ACCESS Data Mining Technology for Efficient Network Security Management Ankit Naik [1], S.W. Ahmad [2] Student [1], Assistant Professor [2] Department of Computer Science and Engineering
Finding Frequent Itemsets using Apriori Algorihm to Detect Intrusions in Large Dataset
Finding Frequent Itemsets using Apriori Algorihm to Detect Intrusions in Large Dataset Kamini Nalavade1, B.B. Meshram2, Abstract With the growth of hacking and exploiting tools and invention of new ways
WEB APPLICATION FIREWALL
WEB APPLICATION FIREWALL CS499 : B.Tech Project Final Report by Namit Gupta (Y3188) Abakash Saikia (Y3349) under the supervision of Dr. Dheeraj Sanghi submitted to Department of Computer Science and Engineering
CHAPTER 1 INTRODUCTION
21 CHAPTER 1 INTRODUCTION 1.1 PREAMBLE Wireless ad-hoc network is an autonomous system of wireless nodes connected by wireless links. Wireless ad-hoc network provides a communication over the shared wireless
Adaptive Anomaly Detection for Network Security
International Journal of Computer and Internet Security. ISSN 0974-2247 Volume 5, Number 1 (2013), pp. 1-9 International Research Publication House http://www.irphouse.com Adaptive Anomaly Detection for
Machine Learning using MapReduce
Machine Learning using MapReduce What is Machine Learning Machine learning is a subfield of artificial intelligence concerned with techniques that allow computers to improve their outputs based on previous
NETWORK-BASED INTRUSION DETECTION USING NEURAL NETWORKS
1 NETWORK-BASED INTRUSION DETECTION USING NEURAL NETWORKS ALAN BIVENS [email protected] RASHEDA SMITH [email protected] CHANDRIKA PALAGIRI [email protected] BOLESLAW SZYMANSKI [email protected] MARK
Using Data Mining for Mobile Communication Clustering and Characterization
Using Data Mining for Mobile Communication Clustering and Characterization A. Bascacov *, C. Cernazanu ** and M. Marcu ** * Lasting Software, Timisoara, Romania ** Politehnica University of Timisoara/Computer
A Study of Web Log Analysis Using Clustering Techniques
A Study of Web Log Analysis Using Clustering Techniques Hemanshu Rana 1, Mayank Patel 2 Assistant Professor, Dept of CSE, M.G Institute of Technical Education, Gujarat India 1 Assistant Professor, Dept
On Entropy in Network Traffic Anomaly Detection
On Entropy in Network Traffic Anomaly Detection Jayro Santiago-Paz, Deni Torres-Roman. Cinvestav, Campus Guadalajara, Mexico November 2015 Jayro Santiago-Paz, Deni Torres-Roman. 1/19 On Entropy in Network
Credit Card Fraud Detection Using Self Organised Map
International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 4, Number 13 (2014), pp. 1343-1348 International Research Publications House http://www. irphouse.com Credit Card Fraud
IDS IN TELECOMMUNICATION NETWORK USING PCA
IDS IN TELECOMMUNICATION NETWORK USING PCA Mohamed Faisal Elrawy 1, T. K. Abdelhamid 2 and A. M. Mohamed 3 1 Faculty of engineering, MUST University, 6th Of October, Egypt [email protected] 2,3
Survey of Data Mining Approach using IDS
Survey of Data Mining Approach using IDS 1 Raman kamboj, 2 Kamal Kumar Research Scholar, Assistant Professor SDDIET, Department of Computer Science & Engineering, Kurukshetra Universty Abstract - In our
A SYSTEM FOR DENIAL OF SERVICE ATTACK DETECTION BASED ON MULTIVARIATE CORRELATION ANALYSIS
Journal homepage: www.mjret.in ISSN:2348-6953 A SYSTEM FOR DENIAL OF SERVICE ATTACK DETECTION BASED ON MULTIVARIATE CORRELATION ANALYSIS P.V.Sawant 1, M.P.Sable 2, P.V.Kore 3, S.R.Bhosale 4 Department
System for Denial-of-Service Attack Detection Based On Triangle Area Generation
System for Denial-of-Service Attack Detection Based On Triangle Area Generation 1, Heena Salim Shaikh, 2 N Pratik Pramod Shinde, 3 Prathamesh Ravindra Patil, 4 Parag Ramesh Kadam 1, 2, 3, 4 Student 1,
NETWORK INTRUSION DETECTION SYSTEM USING HYBRID CLASSIFICATION MODEL
NETWORK INTRUSION DETECTION SYSTEM USING HYBRID CLASSIFICATION MODEL Prof. Santosh T. Waghmode 1, Prof. Vinod S. Wadne 2 Department of Computer Engineering, 1, 2 JSPM s Imperial College of Engineering
A Novel Approach for Network Traffic Summarization
A Novel Approach for Network Traffic Summarization Mohiuddin Ahmed, Abdun Naser Mahmood, Michael J. Maher School of Engineering and Information Technology, UNSW Canberra, ACT 2600, Australia, [email protected],[email protected],M.Maher@unsw.
A Frequency-Based Approach to Intrusion Detection
A Frequency-Based Approach to Intrusion Detection Mian Zhou and Sheau-Dong Lang School of Electrical Engineering & Computer Science and National Center for Forensic Science, University of Central Florida,
Web Forensic Evidence of SQL Injection Analysis
International Journal of Science and Engineering Vol.5 No.1(2015):157-162 157 Web Forensic Evidence of SQL Injection Analysis 針 對 SQL Injection 攻 擊 鑑 識 之 分 析 Chinyang Henry Tseng 1 National Taipei University
Data Mining and Knowledge Discovery in Databases (KDD) State of the Art. Prof. Dr. T. Nouri Computer Science Department FHNW Switzerland
Data Mining and Knowledge Discovery in Databases (KDD) State of the Art Prof. Dr. T. Nouri Computer Science Department FHNW Switzerland 1 Conference overview 1. Overview of KDD and data mining 2. Data
Network Intrusion Detection System Using Genetic Algorithm and Fuzzy Logic
Network Intrusion Detection System Using Genetic Algorithm and Fuzzy Logic Mostaque Md. Morshedur Hassan Assistant Professor, Department of Computer Science and IT, Lalit Chandra Bharali College, Guwahati,
Bisecting K-Means for Clustering Web Log data
Bisecting K-Means for Clustering Web Log data Ruchika R. Patil Department of Computer Technology YCCE Nagpur, India Amreen Khan Department of Computer Technology YCCE Nagpur, India ABSTRACT Web usage mining
Echidna: Efficient Clustering of Hierarchical Data for Network Traffic Analysis
Echidna: Efficient Clustering of Hierarchical Data for Network Traffic Analysis Abdun Mahmood, Christopher Leckie, Parampalli Udaya Department of Computer Science and Software Engineering University of
Role of Anomaly IDS in Network
Role of Anomaly IDS in Network SumathyMurugan 1, Dr.M.Sundara Rajan 2 1 Asst. Prof, Department of Computer Science, Thiruthangal Nadar College, Chennai -51. 2 Asst. Prof, Department of Computer Science,
A SURVEY ON GENETIC ALGORITHM FOR INTRUSION DETECTION SYSTEM
A SURVEY ON GENETIC ALGORITHM FOR INTRUSION DETECTION SYSTEM MS. DIMPI K PATEL Department of Computer Science and Engineering, Hasmukh Goswami college of Engineering, Ahmedabad, Gujarat ABSTRACT The Internet
131-1. Adding New Level in KDD to Make the Web Usage Mining More Efficient. Abstract. 1. Introduction [1]. 1/10
1/10 131-1 Adding New Level in KDD to Make the Web Usage Mining More Efficient Mohammad Ala a AL_Hamami PHD Student, Lecturer m_ah_1@yahoocom Soukaena Hassan Hashem PHD Student, Lecturer soukaena_hassan@yahoocom
Chapter 2. Background. 2.1 Anomalies in Network. 2.1.1 Performance Related Anomalies
Chapter 2 Background This chapter includes three parts, viz., basics of network anomalies, detection of such anomalies and evaluation criteria for detection methods. It presents definition, causes, sources,
Hybrid Model For Intrusion Detection System Chapke Prajkta P., Raut A. B.
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume1 Issue 3 Dec 2012 Page No. 151-155 Hybrid Model For Intrusion Detection System Chapke Prajkta P., Raut A. B.
Usefulness of DARPA Dataset for Intrusion Detection System Evaluation
Usefulness of DARPA Dataset for Intrusion Detection System Evaluation Ciza Thomas Vishwas Sharma N. Balakrishnan Indian Institute of Science, Bangalore, India ABSTRACT The MIT Lincoln Laboratory IDS evaluation
STANDARDISATION AND CLASSIFICATION OF ALERTS GENERATED BY INTRUSION DETECTION SYSTEMS
STANDARDISATION AND CLASSIFICATION OF ALERTS GENERATED BY INTRUSION DETECTION SYSTEMS Athira A B 1 and Vinod Pathari 2 1 Department of Computer Engineering,National Institute Of Technology Calicut, India
VHDL Modeling of Intrusion Detection & Prevention System (IDPS) A Neural Network Approach
VHDL Modeling of Intrusion Detection & Prevention System (IDPS) A Neural Network Approach Tanusree Chatterjee Department of Computer Science Regent Education and Research Foundation Abstract- The rapid
Social Media Mining. Data Mining Essentials
Introduction Data production rate has been increased dramatically (Big Data) and we are able store much more data than before E.g., purchase data, social media data, mobile phone data Businesses and customers
Bandwidth based Distributed Denial of Service Attack Detection using Artificial Immune System
Bandwidth based Distributed Denial of Service Attack Detection using Artificial Immune System 1 M.Yasodha, 2 S. Umarani 1 PG Scholar, Department of Information Technology, Maharaja Engineering College,
Network Traffic Anomaly Detection Based on Packet Bytes
Network Traffic Anomaly Detection Based on Packet Bytes Matthew V. Mahoney Florida Institute of Technology, Melbourne, Florida [email protected] ABSTRACT Hostile network traffic is often "different"
Impact of Feature Selection on the Performance of Wireless Intrusion Detection Systems
2009 International Conference on Computer Engineering and Applications IPCSIT vol.2 (2011) (2011) IACSIT Press, Singapore Impact of Feature Selection on the Performance of ireless Intrusion Detection Systems
An Introduction to Data Mining. Big Data World. Related Fields and Disciplines. What is Data Mining? 2/12/2015
An Introduction to Data Mining for Wind Power Management Spring 2015 Big Data World Every minute: Google receives over 4 million search queries Facebook users share almost 2.5 million pieces of content
SURVEY OF INTRUSION DETECTION SYSTEM
SURVEY OF INTRUSION DETECTION SYSTEM PRAJAPATI VAIBHAVI S. SHARMA DIPIKA V. ASST. PROF. ASST. PROF. MANISH INSTITUTE OF COMPUTER STUDIES MANISH INSTITUTE OF COMPUTER STUDIES VISNAGAR VISNAGAR GUJARAT GUJARAT
A Visualization Technique for Monitoring of Network Flow Data
A Visualization Technique for Monitoring of Network Flow Data Manami KIKUCHI Ochanomizu University Graduate School of Humanitics and Sciences Otsuka 2-1-1, Bunkyo-ku, Tokyo, JAPAPN [email protected]
Network Based Intrusion Detection Using Honey pot Deception
Network Based Intrusion Detection Using Honey pot Deception Dr.K.V.Kulhalli, S.R.Khot Department of Electronics and Communication Engineering D.Y.Patil College of Engg.& technology, Kolhapur,Maharashtra,India.
Denial-Of-Service Attack Detection Based On Multivariate Correlation Analysis and Triangle Area Map Generation
Denial-Of-Service Attack Detection Based On Multivariate Correlation Analysis and Triangle Area Map Generation Heena Salim Shaikh, Parag Ramesh Kadam, N Pratik Pramod Shinde, Prathamesh Ravindra Patil,
Mahalanobis Distance Map Approach for Anomaly Detection
Edith Cowan University Research Online Australian Information Security Management Conference Security Research Institute Conferences 2010 Mahalanobis Distance Map Approach for Anomaly Detection Aruna Jamdagnil
Intrusion Detection Systems and Supporting Tools. Ian Welch NWEN 405 Week 12
Intrusion Detection Systems and Supporting Tools Ian Welch NWEN 405 Week 12 IDS CONCEPTS Firewalls. Intrusion detection systems. Anderson publishes paper outlining security problems 1972 DNS created 1984
An Evaluation of Machine Learning Method for Intrusion Detection System Using LOF on Jubatus
An Evaluation of Machine Learning Method for Intrusion Detection System Using LOF on Jubatus Tadashi Ogino* Okinawa National College of Technology, Okinawa, Japan. * Corresponding author. Email: [email protected]
An Approach for Detecting and Preventing DoS Attacks in LAN
An Approach for Detecting and Preventing DoS Attacks in LAN Majed Tabash 1, Tawfiq Barhoom 2. 1 Faculty of Information Technology, Islamic University Gazs, Palestine. 2 Faculty of Information Technology,
A Dynamic Flooding Attack Detection System Based on Different Classification Techniques and Using SNMP MIB Data
International Journal of Computer Networks and Communications Security VOL. 2, NO. 9, SEPTEMBER 2014, 279 284 Available online at: www.ijcncs.org ISSN 2308-9830 C N C S A Dynamic Flooding Attack Detection
How To Detect Denial Of Service Attack On A Network With A Network Traffic Characterization Scheme
Efficient Detection for DOS Attacks by Multivariate Correlation Analysis and Trace Back Method for Prevention Thivya. T 1, Karthika.M 2 Student, Department of computer science and engineering, Dhanalakshmi
A Review of Intrusion Detection Technique by Soft Computing and Data Mining Approach
A Review of Intrusion Detection Technique by Soft Computing and Data Mining Approach Aditya Shrivastava 1, Mukesh Baghel 2, Hitesh Gupta 3 Abstract The growth of internet technology spread a large amount
Botnet Detection Based on Degree Distributions of Node Using Data Mining Scheme
Botnet Detection Based on Degree Distributions of Node Using Data Mining Scheme Chunyong Yin 1,2, Yang Lei 1, Jin Wang 1 1 School of Computer & Software, Nanjing University of Information Science &Technology,
Denial of Service attacks: analysis and countermeasures. Marek Ostaszewski
Denial of Service attacks: analysis and countermeasures Marek Ostaszewski DoS - Introduction Denial-of-service attack (DoS attack) is an attempt to make a computer resource unavailable to its intended
International Journal of Computer Science Trends and Technology (IJCST) Volume 2 Issue 3, May-Jun 2014
RESEARCH ARTICLE OPEN ACCESS A Survey of Data Mining: Concepts with Applications and its Future Scope Dr. Zubair Khan 1, Ashish Kumar 2, Sunny Kumar 3 M.Tech Research Scholar 2. Department of Computer
CURRENT STUDIES ON INTRUSION DETECTION SYSTEM, GENETIC ALGORITHM AND FUZZY LOGIC
ABSTRACT CURRENT STUDIES ON INTRUSION DETECTION SYSTEM, GENETIC ALGORITHM AND FUZZY LOGIC Mostaque Md. Morshedur Hassan LCB College, Maligaon, Guwahati, Assam, India. [email protected] Nowadays Intrusion
A Novel Distributed Denial of Service (DDoS) Attacks Discriminating Detection in Flash Crowds
International Journal of Research Studies in Science, Engineering and Technology Volume 1, Issue 9, December 2014, PP 139-143 ISSN 2349-4751 (Print) & ISSN 2349-476X (Online) A Novel Distributed Denial
Data Mining Project Report. Document Clustering. Meryem Uzun-Per
Data Mining Project Report Document Clustering Meryem Uzun-Per 504112506 Table of Content Table of Content... 2 1. Project Definition... 3 2. Literature Survey... 3 3. Methods... 4 3.1. K-means algorithm...
Adaptive Framework for Network Traffic Classification using Dimensionality Reduction and Clustering
IV International Congress on Ultra Modern Telecommunications and Control Systems 22 Adaptive Framework for Network Traffic Classification using Dimensionality Reduction and Clustering Antti Juvonen, Tuomo
Classification Algorithms in Intrusion Detection System: A Survey
Classification Algorithms in Intrusion Detection System: A Survey V. Jaiganesh 1 Dr. P. Sumathi 2 A.Vinitha 3 1 Doctoral Research Scholar, Department of Computer Science, Manonmaniam Sundaranar University,
Robust Preprocessing and Random Forests Technique for Network Probe Anomaly Detection
International Journal of Soft Computing and Engineering (IJSCE) Robust Preprocessing and Random Forests Technique for Network Probe Anomaly Detection G. Sunil Kumar, C.V.K Sirisha, Kanaka Durga.R, A.Devi
Second-generation (GenII) honeypots
Second-generation (GenII) honeypots Bojan Zdrnja CompSci 725, University of Auckland, Oct 2004. [email protected] Abstract Honeypots are security resources which trap malicious activities, so they
Network Intrusion Detection Using a HNB Binary Classifier
2015 17th UKSIM-AMSS International Conference on Modelling and Simulation Network Intrusion Detection Using a HNB Binary Classifier Levent Koc and Alan D. Carswell Center for Security Studies, University
