• No results found

[PDF] Top 20 A novel intrusion detection method based on OCSVM and K-means recursive clustering

Has 10000 "A novel intrusion detection method based on OCSVM and K-means recursive clustering" found on our website. Below are the top 20 most common "A novel intrusion detection method based on OCSVM and K-means recursive clustering".

A novel intrusion detection method based on OCSVM and K-means recursive clustering

A novel intrusion detection method based on OCSVM and K-means recursive clustering

... The method is tested on three different ...the method is stable and its performance is not influenced by the selection of parameters ν and ...by KOCSVM but also the total overhead on the ... See full document

10

Evaluation of K Means Clustering for Effective Intrusion Detection and Prevention in Massive Network Traffic Data

Evaluation of K Means Clustering for Effective Intrusion Detection and Prevention in Massive Network Traffic Data

... of intrusion, Intrusion detection and prevention is becoming the major challenge in the world of network ...in intrusion detections, but unfortunately any of the systems so far is not ... See full document

6

Routing Attacks Detection Method of Wireless Sensor Network

Routing Attacks Detection Method of Wireless Sensor Network

... anomaly detection method based on particle swarm optimization K-means clustering algorithm to detect routing attacks caused by abnormal flows in this ...paper. ... See full document

11

Effective Intrusion Detection with a Neural Network Ensemble Using Fuzzy Clustering and Stacking Combination Method

Effective Intrusion Detection with a Neural Network Ensemble Using Fuzzy Clustering and Stacking Combination Method

... for intrusion detection since they have the capability of automation and improving the ...for intrusion detection might involve some difficulties and limitations such as high complexity, ... See full document

13

Detecting Intrusion on AODV based Mobile Ad Hoc
                      Networks by k-means Clustering method of Data
                      Mining

Detecting Intrusion on AODV based Mobile Ad Hoc Networks by k-means Clustering method of Data Mining

... network." Intrusion is defined as “any set of actions that attempts to compromise the integrity, confidentiality or availability of ...resources”. Intrusion detection systems (IDS) are mainly ... See full document

6

Host Based Intrusion Detection System Based on Fusion of Classifier using K means Clustering

Host Based Intrusion Detection System Based on Fusion of Classifier using K means Clustering

... classifiers. Intrusion Detection Systems aim at detecting intruder for ...Proposed novel technique of fusing classifiers to detect the coming request in Distributed intrusion detection ... See full document

5

Evaluation Of Fuzzy K-Means And K-Means Clustering Algorithms In Intrusion Detection Systems

Evaluation Of Fuzzy K-Means And K-Means Clustering Algorithms In Intrusion Detection Systems

... INSTRUSION Detection System monitors the violation of management and security policy and malicious activities in the computerized network ...The intrusion can be caused by inside (legal users), or outside ... See full document

7

A SVM and K means Clustering based Fast and Efficient Intrusion Detection System

A SVM and K means Clustering based Fast and Efficient Intrusion Detection System

... The intrusion detection systems are used to detect such type of attack on a ...signature based technique and other is anomaly based methods both the algorithms have their advantages and ... See full document

5

An Adaptive Intrusion Detection Model based on Machine Learning Techniques

An Adaptive Intrusion Detection Model based on Machine Learning Techniques

... effective method for searching the problem space to find a near optimal solution ...data clustering algorithm based on GSA and k-means (GSA-KM), which uses the advantages of both ... See full document

5

A Survey on Intrusion Detection System Using Data Mining Techniques

A Survey on Intrusion Detection System Using Data Mining Techniques

... classification, clustering and association ...is clustering and so K-means, Y- means and Fuzzy C-means clustering are ...analysed. k-means algorithm reduces ... See full document

6

Entropy clustering based granular classifiers for network intrusion detection

Entropy clustering based granular classifiers for network intrusion detection

... work intrusion detection. A granular classifier based on entropy-clustering method and supported vector ma- chine is constructed to overcome the shortcoming that most of the ... See full document

10

Implementation of K Means Clustering for Intrusion Detection

Implementation of K Means Clustering for Intrusion Detection

... Machine learning is embraced in an extensive variety of areas where it demonstrates its predominance over customary lead based calculations. These strategies are being coordinated in digital recognition frameworks ... See full document

10

Online Full Text

Online Full Text

... Traditional intrusion detection systems (IDS) look for unusual or suspicious activity, such as patterns of network traffic that are likely indicators of unauthorized ...an intrusion detection ... See full document

5

An Analysis of K-means Algorithm Based Network Intrusion Detection System

An Analysis of K-means Algorithm Based Network Intrusion Detection System

... This paper presents a comparative analysis hybrid machine learning technique to detect Denial of Service (DoS) attacks, Probing (Probe) attacks, User-to-Root (U2R) attacks and Remote- to-Local (R2L) attacks. We can know ... See full document

6

EBK Means: A Clustering Technique based on Elbow Method and K Means in WSN

EBK Means: A Clustering Technique based on Elbow Method and K Means in WSN

... In the proposed method, finding an optimum „k‟ value is performed by Elbow method and clustering is done by k-means algorithm, hence routing protocol LEACH which is a traditional energy [r] ... See full document

8

Title: A Novel Kernel Based Fuzzy C Means Clustering With Cluster Validity Measures

Title: A Novel Kernel Based Fuzzy C Means Clustering With Cluster Validity Measures

... Clustering method is a process in which a data set or say pixels are replaced by cluster, pixels may belong together because of the same color, texture ...the clustering methods, one of the most ... See full document

7

Context-Aware Intrusion Detection System in Distributed Systems

Context-Aware Intrusion Detection System in Distributed Systems

... Misuse based detection of ...Misuse based IDS are fast but not capable of detecting new attacks. Agent based IDS is used to find new ...for Intrusion, the IDS is based on the ... See full document

6

Improved Performance of Dataset Classification Using K-Means Clustering Method and PVFCA
                 

Improved Performance of Dataset Classification Using K-Means Clustering Method and PVFCA  

... Abstract: Data mining has created an excellent progress in recent year but the matter of missing data has remained an excellent challenge for processing algorithms. It’s an activity of extracting some useful information ... See full document

6

Density Functional Investigation of the Electronic Structures of Some Transition Metal Magnetic Solids and Statistical Methods on Drug Discovery.

Density Functional Investigation of the Electronic Structures of Some Transition Metal Magnetic Solids and Statistical Methods on Drug Discovery.

... reduction based clustering method, we combine sufficient dimension reduction (SDR) and clustering methods to address the compound discovery ...effective clustering strategy to cluster the ... See full document

243

Comparision Of K-Means And K-Medoids Clustering Algorithms For Big Data Using Mapreduce Techniques

Comparision Of K-Means And K-Medoids Clustering Algorithms For Big Data Using Mapreduce Techniques

... makes k-means more efficient, especially for dataset containing large number of ...the k-means algorithm computes the distances between data point and all centers, this is computationally very ... See full document

6

Show all 10000 documents...