Pairwise clusters optimization and cluster most significant feature methods for anomaly-based network intrusion detection system (POC2MSF) / Gervais Hatungimana
Anomaly-based Intrusion Detection System (IDS) uses known baseline to detect patterns which have deviated from normal behaviour. If the baseline is faulty, the IDS performance degrades. Most of researches in IDS which use k-centroids-based clustering methods like K-means, K-medoids, Fuzzy, Hierarchi...
Saved in:
Main Author: | Hatungimana, Gervais (Author) |
---|---|
Format: | Book |
Published: |
Universiti Teknologi MARA Press (Penerbit UiTM),
2018.
|
Subjects: | |
Online Access: | Link Metadata |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Applying double clustering technique for intrusion detection in large-scale log
by: Jakrarin Therdphapiyanak
Published: (2014) -
Clusters of rare disorders and congenital anomalies in South America
by: Augusto César Cardoso-, et al.
Published: (2023) -
Optimizing HPC Applications with Intel Cluster Tools
by: Supalov, Alexander
Published: (2014) -
Optimizing HPC Applications with Intel Cluster Tools
by: Supalov, Alexander
Published: (2014) -
RCLNet: an effective anomaly-based intrusion detection for securing the IoMT system
by: Jamshed Ali Shaikh, et al.
Published: (2024)