Pairwise clusters optimization and cluster most significant feature methods for anomaly-based network intrusion detection system (POC2MSF) / Gervais Hatungimana
Anomaly-based Intrusion Detection System (IDS) uses known baseline to detect patterns which have deviated from normal behaviour. If the baseline is faulty, the IDS performance degrades. Most of researches in IDS which use k-centroids-based clustering methods like K-means, K-medoids, Fuzzy, Hierarchi...
Saved in:
Main Author: | |
---|---|
Format: | Book |
Published: |
Universiti Teknologi MARA Press (Penerbit UiTM),
2018.
|
Subjects: | |
Online Access: | Link Metadata |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Internet
Link Metadata3rd Floor Main Library
Call Number: |
A1234.567 |
---|---|
Copy 1 | Available |