Intrusion signature creation via clustering anomalies.
Gilbert HendryShanchieh Jay YangPublished in: Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security (2008)
Keyphrases
- anomaly detection
- intrusion detection
- intrusion detection system
- k means
- detecting anomalies
- clustering method
- anomalous behavior
- clustering algorithm
- network security
- unsupervised learning
- network traffic
- spectral clustering
- data clustering
- database
- data points
- learning algorithm
- document clustering
- information security
- data objects
- self organizing maps
- similarity function
- data mining tasks
- clustering analysis
- signature recognition
- information retrieval