Mining of Attack Models in IDS Alerts from Network Backbone by a Two-stage Clustering Method.
Lin-Bo QiaoBo-Feng ZhangZhiquan LaiJinshu SuPublished in: IPDPS Workshops (2012)
Keyphrases
- clustering method
- intrusion detection system
- clustering algorithm
- attack scenarios
- intrusion detection
- network traffic
- alert correlation
- document clustering
- hierarchical clustering
- cluster analysis
- k means
- fuzzy c means
- clustering analysis
- spatial clustering
- similarity measure
- anomaly detection
- clustering framework
- affinity propagation
- network intrusion