Online Mining of Attack Models in IDS Alerts from Network Backbone by a Two-Stage Clustering Method.
Lin-Bo QiaoBo-Feng ZhangRui-Yuan ZhaoJinshu SuPublished in: CSS (2013)
Keyphrases
- clustering method
- clustering algorithm
- cluster analysis
- spatial clustering
- similarity measure
- k means
- intrusion detection
- intrusion detection system
- clustering analysis
- attack scenarios
- fuzzy c means
- spectral clustering
- dissimilarity measure
- document clustering
- knowledge discovery
- hierarchical clustering
- ddos attacks
- text mining