首页> 外文会议>International Conference on Database Theory and Application >Applications of Clustering Methods to Anomaly-Based Intrusion Detection Systems
【24h】

Applications of Clustering Methods to Anomaly-Based Intrusion Detection Systems

机译:聚类方法在基于异常的入侵检测系统中的应用

获取原文

摘要

The present paper introduces some applications of clustering methodology, namely FLAME algorithm to the behavioral analysis of the user activities, performed by a host-based intrusion detection system. The normal and anomalous activity patterns are distinguished by 2-means clustering algorithm and separated into two non-intersecting clusters. The results of the performed simulation experiments are represented as well.
机译:本文介绍了集群方法的一些应用,即火焰算法对用户活动的行为分析,由基于主机的入侵检测系统执行。正常和异常的活动模式通过2均分类算法区分,并分成两个非交叉簇。所进行的模拟实验的结果也是如此。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号