메뉴 건너뛰기




Volumn 31, Issue 7, 2010, Pages

Unsupervised anomaly detection method based on improved CURE clustering algorithm

Author keywords

Clustering; CURE; Data mining; Hyper rectangle; Unsupervised anomaly detection

Indexed keywords

CURE; CURE CLUSTERING ALGORITHMS; DATA SETS; NETWORK CONNECTION; NORMAL MODEL; UNSUPERVISED ANOMALY DETECTION;

EID: 77955449038     PISSN: 1000436X     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (9)

References (14)
  • 2
    • 0034335199 scopus 로고    scopus 로고
    • A survey of intrusion detection research on network security
    • Jiang J C, Ma H T, Ren D E, et al. A survey of intrusion detection research on network security [J]. Journal of Software, 2000, 11(11): 1460-1466.
    • (2000) Journal of Software , vol.11 , Issue.11 , pp. 1460-1466
    • Jiang, J.C.1    Ma, H.T.2    Ren, D.E.3
  • 4
    • 33644860127 scopus 로고    scopus 로고
    • A clustering-based method for unsupervised intrusion detections
    • Jiang S Y, Song X, Wang H, et al. A clustering-based method for unsupervised intrusion detections [J]. Pattern Recognition Letters, 2006, 27(7): 802-810.
    • (2006) Pattern Recognition Letters , vol.27 , Issue.7 , pp. 802-810
    • Jiang, S.Y.1    Song, X.2    Wang, H.3
  • 5
    • 0141797880 scopus 로고    scopus 로고
    • A geometric framework for unsupervised anomaly detection: detecting intrusions in unlabeled data
    • Boston
    • Eskin E, Arnold A, Prerau M, et al. A geometric framework for unsupervised anomaly detection: detecting intrusions in unlabeled data [A]. Applications of Data Mining in Computer Security [C]. Boston, 2002. 78-99.
    • (2002) Applications of Data Mining in Computer Security , pp. 78-99
    • Eskin, E.1    Arnold, A.2    Prerau, M.3
  • 9
    • 0142187790 scopus 로고    scopus 로고
    • A research on intrusion detection based on unsupervised clustering and support vector machine
    • Heidelberg
    • Luo M, Wang L, Zhang H, et al. A research on intrusion detection based on unsupervised clustering and support vector machine [A]. Information and Communications Security [C]. Heidelberg, 2003. 325-336.
    • (2003) Information and Communications Security , pp. 325-336
    • Luo, M.1    Wang, L.2    Zhang, H.3
  • 10
    • 33746497836 scopus 로고    scopus 로고
    • A data-mining based DoS detection technique
    • Gao N, Feng D G, Xiang J. A data-mining based DoS detection technique [J]. Chinese Journal of Computers, 2006, 29(6): 944-951.
    • (2006) Chinese Journal of Computers , vol.29 , Issue.6 , pp. 944-951
    • Gao, N.1    Feng, D.G.2    Xiang, J.3
  • 11
    • 50049091231 scopus 로고    scopus 로고
    • An algorithm for automatic clustering number determination in networks intrusion detection
    • Xiao L Z, Shao Z Q, Ma H H, et al. An algorithm for automatic clustering number determination in networks intrusion detection [J]. Journal of Software, 2008, 19(8):2140-2148.
    • (2008) Journal of Software , vol.19 , Issue.8 , pp. 2140-2148
    • Xiao, L.Z.1    Shao, Z.Q.2    Ma, H.H.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.