Clustering analysis for malicious network traffic.
Jie WangLili YangJie WuJemal H. AbawajyPublished in: ICC (2017)
Keyphrases
- clustering analysis
- network traffic
- anomaly detection
- malicious code
- malicious traffic
- normal traffic
- intrusion detection
- clustering method
- fuzzy clustering
- intrusion detection system
- network security
- computer networks
- microarray
- cluster analysis
- traffic data
- data clustering
- data mining
- network traffic data
- clustering algorithm
- network intrusion detection
- network bandwidth
- traffic analysis
- detecting anomalous
- knowledge discovery
- k means
- internet traffic
- real world
- traffic patterns
- information retrieval
- data sets
- unsupervised learning
- image segmentation
- feature selection
- long range dependence