Malicious Traffic Detection Using K-means

作者: Dong Hyuk Shin , Kwang Kue An , Sung Chune Choi , Hyoung-Kee Choi

DOI: 10.7840/KICS.2016.41.2.277

关键词: Cluster analysisComputer sciencek-means clusteringBayes' theoremDenial-of-service attackSignature (logic)Intrusion detection systemComplement (complexity)Computer securityAirfield traffic pattern

摘要: … high detection rate by using database of previous attack signatures or known malicious traffic … In this paper, we propose a k-means clustering based malicious traffic detection method to …

参考文章(18)
Advances in Data Mining. Applications and Theoretical Aspects Lecture Notes in Computer Science. ,vol. 5633, pp. 13- 23 ,(2009) , 10.1007/978-3-642-03067-3
Martin Roesch, Snort - Lightweight Intrusion Detection for Networks usenix large installation systems administration conference. pp. 229- 238 ,(1999)
Latifur Khan, Mamoun Awad, Bhavani Thuraisingham, A new intrusion detection system using support vector machines and hierarchical clustering very large data bases. ,vol. 16, pp. 507- 521 ,(2007) , 10.1007/S00778-006-0002-5
M. Emre Celebi, Hassan A. Kingravi, Patricio A. Vela, A comparative study of efficient initialization methods for the k-means clustering algorithm Expert Systems With Applications. ,vol. 40, pp. 200- 210 ,(2013) , 10.1016/J.ESWA.2012.07.021
Sung-Ho Yoon, Myung-Sup Kim, Behavior Based Signature Extraction Method for Internet Application Traffic Identification The Journal of Korean Institute of Communications and Information Sciences. pp. 368- 376 ,(2013) , 10.7840/KICS.2013.38B.5.368
Keunsoo Lee, Juhyun Kim, Ki Hoon Kwon, Younggoo Han, Sehun Kim, DDoS attack detection method using cluster analysis Expert Systems With Applications. ,vol. 34, pp. 1659- 1665 ,(2008) , 10.1016/J.ESWA.2007.01.040
Philippe Esling, Carlos Agon, Time-series data mining ACM Computing Surveys. ,vol. 45, pp. 1- 34 ,(2012) , 10.1145/2379776.2379788
Haakon Ringberg, Augustin Soule, Jennifer Rexford, Christophe Diot, Sensitivity of PCA for traffic anomaly detection measurement and modeling of computer systems. ,vol. 35, pp. 109- 120 ,(2007) , 10.1145/1254882.1254895
Fernando Silveira, Christophe Diot, Nina Taft, Ramesh Govindan, ASTUTE Proceedings of the ACM SIGCOMM 2010 conference on SIGCOMM - SIGCOMM '10. ,vol. 40, pp. 267- 278 ,(2010) , 10.1145/1851182.1851215