Conformal Clustering and Its Application to Botnet Traffic.
Giovanni CherubinIlia NouretdinovAlexander GammermanRoberto JordaneyZhi WangDavide PapiniLorenzo CavallaroPublished in: SLDS (2015)
Keyphrases
- network traffic
- clustering algorithm
- k means
- ddos attacks
- fuzzy clustering
- peer to peer
- hierarchical clustering
- denial of service attacks
- clustering method
- document clustering
- real time
- information theoretic
- self organizing maps
- data points
- cluster analysis
- distance metric
- data clustering
- unsupervised learning
- fuzzy c means
- data mining tasks
- neural network
- data sets