Unsupervised Anomaly Detection with Unlabeled Data Using Clustering
Intrusions pose a serious security risk in a network environment. New intrusion types, of which detection systems are unaware, are the most difficult to detect. The amount of available network audit data instances is usually large; human labeling is tedious, time-consuming, and expensive. Traditiona...
| Main Authors: | Chimphlee, Witcha, Abdullah, Abdul Hanan, Md. Sap, Mohd. Noor |
|---|---|
| Format: | Conference or Workshop Item |
| Language: | English |
| Published: |
2005
|
| Subjects: | |
| Online Access: | http://eprints.utm.my/3356/ http://eprints.utm.my/3356/1/Mohd_Noor_-_Unsupervised_Anomaly_Detection_with_Unlabeled_Data.pdf |
Similar Items
Anomaly-based intrusion detection using fuzzy rough clustering
by: Chimphlee, Witcha, et al.
Published: (2006)
by: Chimphlee, Witcha, et al.
Published: (2006)
Integrating genetic algorithms and fuzzy c-means for anomaly detection
by: Chimphlee, Witcha, et al.
Published: (2005)
by: Chimphlee, Witcha, et al.
Published: (2005)
Anomaly detection of intrusion based on integration of rough sets and fuzzy c-means
by: Chimphlee, Witcha, et al.
Published: (2005)
by: Chimphlee, Witcha, et al.
Published: (2005)
To identify suspicious activity in anomaly detection based on soft computing
by: Chimphlee, Witcha, et al.
Published: (2006)
by: Chimphlee, Witcha, et al.
Published: (2006)
Anomaly network intrusion detection method in network security based on principle component analysis
by: Chimphlee, Witcha, et al.
Published: (2006)
by: Chimphlee, Witcha, et al.
Published: (2006)
Modelling kernel methods for unsupervised learning of micro array data
by: Md. Sap, Mohd. Noor
Published: (2008)
by: Md. Sap, Mohd. Noor
Published: (2008)
Real-time anomaly detection using clustering in big data technologies / Riyaz Ahamed Ariyaluran Habeeb
by: Riyaz Ahamed , Ariyaluran Habeeb
Published: (2019)
by: Riyaz Ahamed , Ariyaluran Habeeb
Published: (2019)
Dynamic unsupervised feedforward neural network clustering / Roya Asadi
by: Roya, Asadi
Published: (2016)
by: Roya, Asadi
Published: (2016)
Rough Sets Clustering and Markov model for Web Access Prediction
by: Chimphlee, Siriporn, et al.
Published: (2006)
by: Chimphlee, Siriporn, et al.
Published: (2006)
Clustering of Chemical Compounds using Unsupervised Neural Networks Algorithms: a comparison
by: Zeb Shah, Jehan, et al.
Published: (2006)
by: Zeb Shah, Jehan, et al.
Published: (2006)
Clustering of chemical compounds using unsupervised neural networks algorithms : a comparison
by: Zeb Shah, Jehan, et al.
Published: (2006)
by: Zeb Shah, Jehan, et al.
Published: (2006)
Predictive data mining based on similarity and clustering methods.
by: Defit, Sarjon, et al.
Published: (2000)
by: Defit, Sarjon, et al.
Published: (2000)
Clustering Spatial Data Using a Kernel-Based Algorithm
by: Awan, A. Majid, et al.
Published: (2005)
by: Awan, A. Majid, et al.
Published: (2005)
Finding spatio-temporal patterns in climate data using clustering
by: Md. Sap, Mohd. Noor, et al.
Published: (2005)
by: Md. Sap, Mohd. Noor, et al.
Published: (2005)
Clustering technique in data mining : general and research perspective.
by: Che Mat @ Mohd. Shukor, Zamzarina, et al.
Published: (2002)
by: Che Mat @ Mohd. Shukor, Zamzarina, et al.
Published: (2002)
Iterative window size estimation on self-similarity measurement for network traffic anomaly detection
by: Idris, Mohd. Yazid, et al.
Published: (2004)
by: Idris, Mohd. Yazid, et al.
Published: (2004)
Ontological knowledge management through hybrid unsupervised clustering techniques
by: Ching-Chieh, Kiu, et al.
Published: (2008)
by: Ching-Chieh, Kiu, et al.
Published: (2008)
Ontological knowledge management through hybrid unsupervised clustering techniques
by: Ching-Chieh, Kiu, et al.
Published: (2008)
by: Ching-Chieh, Kiu, et al.
Published: (2008)
Rough fuzzy approach for web usage mining
by: Chimphlee, Siriporn, et al.
Published: (2006)
by: Chimphlee, Siriporn, et al.
Published: (2006)
Hybrid self organizing map for overlapping clusters
by: Md. Sap, Mohd. Noor, et al.
Published: (2008)
by: Md. Sap, Mohd. Noor, et al.
Published: (2008)
Outlier Detection Technique in Data Mining: A Research Perspective
by: Mansur, M. O., et al.
Published: (2005)
by: Mansur, M. O., et al.
Published: (2005)
Feature selection using rough-dpso in anomaly intrusion detection
by: Zainal, Anazida, et al.
Published: (2007)
by: Zainal, Anazida, et al.
Published: (2007)
Application of kohonen neural network and rough approximation for overlapping clusters optimization
by: Mohebi, E., et al.
Published: (2008)
by: Mohebi, E., et al.
Published: (2008)
TeKET: a tree-based unsupervised keyphrase extraction technique
by: Rabby, Gollam, et al.
Published: (2020)
by: Rabby, Gollam, et al.
Published: (2020)
An optimized feature set for anomaly-based intrusion detection / Wasswa Hassan
by: Wasswa, Hassan
Published: (2019)
by: Wasswa, Hassan
Published: (2019)
Clustering High Dimensional Data Using Subspace And Projected Clustering Algorithms
by: Sembiring, Rahmat Widia, et al.
Published: (2010)
by: Sembiring, Rahmat Widia, et al.
Published: (2010)
Anomaly detection in system log files using machine learning algorithms / Zahedeh Zamanian
by: Zahedeh, Zamanian
Published: (2019)
by: Zahedeh, Zamanian
Published: (2019)
Predicting next page access by Markov models and association rules on web log data
by: Chimphlee, S., et al.
Published: (2006)
by: Chimphlee, S., et al.
Published: (2006)
Unsupervised Abnormalities Extraction and Brain Segmentation
by: Tong Hau, Lee, et al.
Published: (2008)
by: Tong Hau, Lee, et al.
Published: (2008)
Keyphrase distance analysis technique from news articles as a feature for keyphrase extraction: An unsupervised approach
by: Miah, Mohammad Badrul Alam, et al.
Published: (2023)
by: Miah, Mohammad Badrul Alam, et al.
Published: (2023)
Data mining and e-commerce : methods, applications, and challenges
by: Rastegari, Hamid, et al.
Published: (2008)
by: Rastegari, Hamid, et al.
Published: (2008)
Keyphrases Concentrated Area Identification from Academic Articles as Feature of Keyphrase Extraction: A New Unsupervised Approach
by: Miah, Mohammad Badrul Alam, et al.
Published: (2022)
by: Miah, Mohammad Badrul Alam, et al.
Published: (2022)
Enhanced Techniques For Detection And Classification Of Neighbor Discovery Protocol Anomalies
by: Firas (M.H.) S., Najjar
Published: (2016)
by: Firas (M.H.) S., Najjar
Published: (2016)
Mobile malware anomaly-based detection systems using static analysis features / Ahmad Firdaus Zainal Abidin
by: Ahmad Firdaus, Zainal Abidin
Published: (2017)
by: Ahmad Firdaus, Zainal Abidin
Published: (2017)
An online density-based clustering algorithm for data stream based on local optimal radius and cluster pruning
by: Islam, Md Kamrul
Published: (2019)
by: Islam, Md Kamrul
Published: (2019)
A binary access control scheme with high data security.
by: Islam, Md. Rafiqul, et al.
Published: (2002)
by: Islam, Md. Rafiqul, et al.
Published: (2002)
Pengelompokan data kajicuaca bagi peramalan taburan hujan
by: Dollah@Md. Zain, Rozilawati, et al.
Published: (2003)
by: Dollah@Md. Zain, Rozilawati, et al.
Published: (2003)
A buffer-based online clustering for evolving data stream
by: Islam, Md. Kamrul, et al.
Published: (2019)
by: Islam, Md. Kamrul, et al.
Published: (2019)
Classification with degree of importance of attributes for stock market data mining
by: Khokhar, Rashid Hafeez, et al.
Published: (2004)
by: Khokhar, Rashid Hafeez, et al.
Published: (2004)
Adaptive intelligence job online scheduling within dynamic grid environment based on gridsim
by: Lorpunmanee, Siriluck, et al.
Published: (2008)
by: Lorpunmanee, Siriluck, et al.
Published: (2008)
Similar Items
-
Anomaly-based intrusion detection using fuzzy rough clustering
by: Chimphlee, Witcha, et al.
Published: (2006) -
Integrating genetic algorithms and fuzzy c-means for anomaly detection
by: Chimphlee, Witcha, et al.
Published: (2005) -
Anomaly detection of intrusion based on integration of rough sets and fuzzy c-means
by: Chimphlee, Witcha, et al.
Published: (2005) -
To identify suspicious activity in anomaly detection based on soft computing
by: Chimphlee, Witcha, et al.
Published: (2006) -
Anomaly network intrusion detection method in network security based on principle component analysis
by: Chimphlee, Witcha, et al.
Published: (2006)