Intrusion detection systems using K-means clustering system
Internet is the biggest platform for people all over the world to connect with each other, and to search for important information and such. Along with the raising of internet usage, the number of cases of intrusion attacks also increases. Because of this, intrusion detection is important, especiall...
| Main Author: | Nor Dzuhairah Hani, Jamaludin |
|---|---|
| Format: | Undergraduates Project Papers |
| Language: | English |
| Published: |
2019
|
| Subjects: | |
| Online Access: | http://umpir.ump.edu.my/id/eprint/26636/ http://umpir.ump.edu.my/id/eprint/26636/1/Intrusion%20detection%20systems%20using%20K-means%20clustering.pdf |
Similar Items
Response Option for Attacks Detected by Intrusion Detection System
by: Shahid, Anwar, et al.
Published: (2015)
by: Shahid, Anwar, et al.
Published: (2015)
From Intrusion Detection to an Intrusion Response System: Fundamentals, Requirements, and Future Directions
by: Shahid, Anwar, et al.
Published: (2017)
by: Shahid, Anwar, et al.
Published: (2017)
Max-D clustering K-means algorithm for Autogeneration of Centroids and Distance of Data Points Cluster
by: Wan Maseri, Wan Mohd, et al.
by: Wan Maseri, Wan Mohd, et al.
Analysis of an intrusion detection system based on immunilogy
by: Saeed Al-Amoudi, Mohammed Hussein
Published: (2008)
by: Saeed Al-Amoudi, Mohammed Hussein
Published: (2008)
MaxD K-Means: A clustering algorithm for auto-generation of centroids and distance of data points in clusters
by: Wan Maseri, Wan Mohd, et al.
Published: (2012)
by: Wan Maseri, Wan Mohd, et al.
Published: (2012)
Rough Set Significant Reduction and Rules of Intrusion Detection System
by: Noor Suhana, Sulaiman, et al.
Published: (2016)
by: Noor Suhana, Sulaiman, et al.
Published: (2016)
Cloud-Based Intrusion Detection and Response System: Open Research Issues, and Solutions
by: Zakira, Inayat, et al.
Published: (2017)
by: Zakira, Inayat, et al.
Published: (2017)
A novel Intrusion Detection System by using intelligent data mining in WEKA environment
by: Mohammed, Muamer N., et al.
Published: (2011)
by: Mohammed, Muamer N., et al.
Published: (2011)
Intrusion-Detection System Based on Fast Learning Network in Cloud Computing
by: Mohammed Hasan, Ali, et al.
Published: (2018)
by: Mohammed Hasan, Ali, et al.
Published: (2018)
Fuzzy C mean clustering in off-line handwriting signature verfication system
by: Lee, Beng Yong
Published: (2006)
by: Lee, Beng Yong
Published: (2006)
Intrusion Response Systems: Foundations, Design, and Challenges
by: Zakira, Inayat, et al.
Published: (2016)
by: Zakira, Inayat, et al.
Published: (2016)
An enhancement of classification technique based on rough set theory for intrusion detection system application
by: Noor Suhana, Sulaiman
Published: (2019)
by: Noor Suhana, Sulaiman
Published: (2019)
A fast learning network with improved particle swarm optimization for intrusion detection system
by: Ali, Mohammed Hasan
Published: (2019)
by: Ali, Mohammed Hasan
Published: (2019)
A novel local network intrusion detection system based on support vector machine
by: Mohammed, Muamer N., et al.
Published: (2011)
by: Mohammed, Muamer N., et al.
Published: (2011)
An architectural design for a hybrid intrusion detection system for database
by: Haratian, Mohammad Hossein
Published: (2009)
by: Haratian, Mohammad Hossein
Published: (2009)
Profiling Smurfs And Boosters on Dota 2 Using K-Means
by: Ding, Ying Jih
Published: (2021)
by: Ding, Ying Jih
Published: (2021)
Feature selection using Rough-DPSO in anomaly intrusion detection
by: Zainal, Anazida, et al.
Published: (2007)
by: Zainal, Anazida, et al.
Published: (2007)
Intrusion detection based on k-means clustering and OneR classification
by: Muda, Zaiton, et al.
Published: (2011)
by: Muda, Zaiton, et al.
Published: (2011)
Intrusion detection based on K-means clustering and Naïve Bayes classification
by: Muda, Zaiton, et al.
Published: (2011)
by: Muda, Zaiton, et al.
Published: (2011)
Intrusion detection using artificial neural network / Gan Sze Kai
by: Gan , Sze Kai
Published: (2002)
by: Gan , Sze Kai
Published: (2002)
A web-based implementation of k-means algorithms
by: Lee, Quan
Published: (2022)
by: Lee, Quan
Published: (2022)
Evaluating oversampling techniques for network intrusion detection data
by: Chan, Jia Lin
Published: (2022)
by: Chan, Jia Lin
Published: (2022)
Rough Set Discretization: Equal Frequency Binning, Entropy/MDL and Semi Naives Algorithms of Intrusion Detection System
by: Noor Suhana, Sulaiman, et al.
Published: (2016)
by: Noor Suhana, Sulaiman, et al.
Published: (2016)
Methods of intrusion detection in information security incident detection: a comparative study
by: Tan, Fui Bee, et al.
Published: (2018)
by: Tan, Fui Bee, et al.
Published: (2018)
A hybrid framework based on neural network MLP and K-means clustering for intrusion detection system
by: Lisehroodi, Mazyar Mohammadi, et al.
Published: (2013)
by: Lisehroodi, Mazyar Mohammadi, et al.
Published: (2013)
Improved intrusion detection algorithm based on TLBO and GA algorithms
by: Aljanabi, Mohammad, et al.
Published: (2021)
by: Aljanabi, Mohammad, et al.
Published: (2021)
A skyline query processing approach over interval uncertain data stream with K-means clustering technique
by: Dzolkhifli, Zarina, et al.
Published: (2019)
by: Dzolkhifli, Zarina, et al.
Published: (2019)
Anomaly-based intrusion detection through K-Means clustering and Naives Bayes classification
by: Yassin, Warusia, et al.
Published: (2013)
by: Yassin, Warusia, et al.
Published: (2013)
Review of intrusion detection systems based on deep learning
techniques: coherent taxonomy, challenges, motivations,
recommendations, substantial analysis and future directions
by: Aleesa, A. M., et al.
Published: (2004)
by: Aleesa, A. M., et al.
Published: (2004)
Anomaly-based intrusion detection through K-means clustering and naives Bayes classification
by: Mohamed Yassin, Warusia, et al.
Published: (2013)
by: Mohamed Yassin, Warusia, et al.
Published: (2013)
Segmentation of CT Brain Images Using K-Means and EM Clustering
by: Lee, Tong Hau, et al.
Published: (2008)
by: Lee, Tong Hau, et al.
Published: (2008)
A controller-agnostic random oracle based intrusion detection method in software defined networks / Adnan
by: Adnan, -
Published: (2016)
by: Adnan, -
Published: (2016)
Web-Based Route Optimization System For Logistic Using Agglomerative Clustering And Genetic Algorithm
by: Tan, Chee Kuan
Published: (2020)
by: Tan, Chee Kuan
Published: (2020)
Recommendation system in selecting course of public university in Malaysia using K-nearest neighbour
by: Thoi, Wen Bin
Published: (2018)
by: Thoi, Wen Bin
Published: (2018)
Anomaly-based intrusion detection using fuzzy rough clustering
by: Chimphlee, Witcha, et al.
Published: (2006)
by: Chimphlee, Witcha, et al.
Published: (2006)
Analysis of K-Mean and X-Mean Clustering Algorithms Using
Ontology-Based Dataset Filtering
by: Rahmah, Mokhtar, et al.
Published: (2021)
by: Rahmah, Mokhtar, et al.
Published: (2021)
A multi-agent K-means with case-based reasoning for an
automated quality assessment of software requirement
specification
by: Mohammed Ahmed Jubair, Mohammed Ahmed Jubair, et al.
Published: (2023)
by: Mohammed Ahmed Jubair, Mohammed Ahmed Jubair, et al.
Published: (2023)
Intrusion detection system using autoencoder based deep neural network for SME cybersecurity
by: Khaizuran Aqhar, Ubaidillah, et al.
Published: (2021)
by: Khaizuran Aqhar, Ubaidillah, et al.
Published: (2021)
Multithreaded Scalable Matching Algorithm For Intrusion Detection Systems
by: Hnaif, Adnan Ahmad Abdelfattah
Published: (2010)
by: Hnaif, Adnan Ahmad Abdelfattah
Published: (2010)
Fuzzy inference system model from non-fuzzy clustering output
by: Hamzah, Nur Atiqah, et al.
Published: (2019)
by: Hamzah, Nur Atiqah, et al.
Published: (2019)
Similar Items
-
Response Option for Attacks Detected by Intrusion Detection System
by: Shahid, Anwar, et al.
Published: (2015) -
From Intrusion Detection to an Intrusion Response System: Fundamentals, Requirements, and Future Directions
by: Shahid, Anwar, et al.
Published: (2017) -
Max-D clustering K-means algorithm for Autogeneration of Centroids and Distance of Data Points Cluster
by: Wan Maseri, Wan Mohd, et al. -
Analysis of an intrusion detection system based on immunilogy
by: Saeed Al-Amoudi, Mohammed Hussein
Published: (2008) -
MaxD K-Means: A clustering algorithm for auto-generation of centroids and distance of data points in clusters
by: Wan Maseri, Wan Mohd, et al.
Published: (2012)