메뉴 건너뛰기




Volumn 54, Issue , 2016, Pages 29-47

Unsupervised learning clustering and self-organized agents applied to help network management

Author keywords

Anomaly detection; Ant Colony Optimization; Network management; Self organized agents; Traffic characterization; Unsupervised learning

Indexed keywords

ANT COLONY OPTIMIZATION; ARTIFICIAL INTELLIGENCE; BUDGET CONTROL; DECISION MAKING; EXPERT SYSTEMS; NETWORK MANAGEMENT; UNSUPERVISED LEARNING;

EID: 84958166080     PISSN: 09574174     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.eswa.2016.01.032     Document Type: Article
Times cited : (26)

References (50)
  • 1
    • 84915760589 scopus 로고    scopus 로고
    • Using response action with intelligent intrusion detection and prevention system against web application malware
    • Alazab A., Hobbs M., Abawajy J., Khraisat A., Alazab M. Using response action with intelligent intrusion detection and prevention system against web application malware Information Management & Computer Security 22 2014 431 449
    • (2014) Information Management & Computer Security , vol.22 , pp. 431-449
    • Alazab, A.1    Hobbs, M.2    Abawajy, J.3    Khraisat, A.4    Alazab, M.5
  • 5
    • 84927924591 scopus 로고    scopus 로고
    • Decentralized detection of network attacks through P2P data clustering of SNMP data
    • Cerroni W., Moro G., Pasolini R., Ramilli M. Decentralized detection of network attacks through P2P data clustering of SNMP data Computers & Security 52 2015 1 16
    • (2015) Computers & Security , vol.52 , pp. 1-16
    • Cerroni, W.1    Moro, G.2    Pasolini, R.3    Ramilli, M.4
  • 6
    • 79951747896 scopus 로고    scopus 로고
    • Explanations of unsupervised learning clustering applied to data security analysis
    • Corral G., Armengol E., Fornells A., Golobardes E. Explanations of unsupervised learning clustering applied to data security analysis Neurocomputing 72 2009 2754 2762
    • (2009) Neurocomputing , vol.72 , pp. 2754-2762
    • Corral, G.1    Armengol, E.2    Fornells, A.3    Golobardes, E.4
  • 7
    • 84937429043 scopus 로고    scopus 로고
    • DDoS attack detection using fast entropy approach on flow- based network traffic
    • David J., Thomas C. DDoS attack detection using fast entropy approach on flow- based network traffic Procedia Computer Science 50 2015 30 36
    • (2015) Procedia Computer Science , vol.50 , pp. 30-36
    • David, J.1    Thomas, C.2
  • 10
    • 84901825380 scopus 로고    scopus 로고
    • A seven-dimensional flow analysis to help autonomous network management
    • de Assis M.V.O., Rodrigues J.J.P.C., Proença M.L. Jr. A seven-dimensional flow analysis to help autonomous network management Information Sciences 278 2014 900 913
    • (2014) Information Sciences , vol.278 , pp. 900-913
    • De Assis, M.V.O.1    Rodrigues, J.J.P.C.2    Proença, M.L.3
  • 13
    • 0015644825 scopus 로고
    • A fuzzy relative of the ISODATA process and its use in detecting compact well-separated clusters
    • Dunn J.C. A fuzzy relative of the ISODATA process and its use in detecting compact well-separated clusters Journal of Cybernetics 3 1973 32 57
    • (1973) Journal of Cybernetics , vol.3 , pp. 32-57
    • Dunn, J.C.1
  • 15
    • 84906542953 scopus 로고    scopus 로고
    • On the combination of genetic fuzzy systems and pairwise learning for improving detection rates on intrusion detection systems
    • Elhag S., Fernández A., Bawakid A., Alshomrani S., Herrera F. On the combination of genetic fuzzy systems and pairwise learning for improving detection rates on intrusion detection systems Expert Systems with Applications 42 2015 193 202
    • (2015) Expert Systems with Applications , vol.42 , pp. 193-202
    • Elhag, S.1    Fernández, A.2    Bawakid, A.3    Alshomrani, S.4    Herrera, F.5
  • 16
    • 48049112184 scopus 로고    scopus 로고
    • CASAN: Clustering algorithm for security in ad hoc networks
    • Elhdhili M.E., Ben Azzouz L., Kamoun F. CASAN: Clustering algorithm for security in ad hoc networks Computer Communications 31 2008 2972 2980
    • (2008) Computer Communications , vol.31 , pp. 2972-2980
    • Elhdhili, M.E.1    Ben Azzouz, L.2    Kamoun, F.3
  • 18
    • 84873857276 scopus 로고    scopus 로고
    • Means algorithms for clustering analysis with frequency sensitive discrepancy metrics
    • Fang C., Jin W., Ma J. Means algorithms for clustering analysis with frequency sensitive discrepancy metrics Pattern Recognition Letters 34 2013 580 586
    • (2013) Pattern Recognition Letters , vol.34 , pp. 580-586
    • Fang, C.1    Jin, W.2    Ma, J.3
  • 19
    • 84931269284 scopus 로고    scopus 로고
    • Autonomous profile-based anomaly detection system using principal component analysis and flow analysis
    • Fernandes G. Jr., Rodrigues J.J.P.C., Proença M.L. Jr. Autonomous profile-based anomaly detection system using principal component analysis and flow analysis Applied Soft Computing 34 2015 513 525
    • (2015) Applied Soft Computing , vol.34 , pp. 513-525
    • Fernandes, G.1    Rodrigues, J.J.P.C.2    Proença, M.L.3
  • 23
    • 80053607468 scopus 로고    scopus 로고
    • An information entropy-based approach to outlier detection in rough sets
    • Jiang F., Sui Y., Cao C. An information entropy-based approach to outlier detection in rough sets Expert Systems with Applications 37 2010 6338 6344
    • (2010) Expert Systems with Applications , vol.37 , pp. 6338-6344
    • Jiang, F.1    Sui, Y.2    Cao, C.3
  • 24
    • 61349143044 scopus 로고    scopus 로고
    • FDF: Frequency detection-based filtering of scanning worms
    • Kim B., Kim H., Bahk S. FDF: Frequency detection-based filtering of scanning worms Computer Communications 32 2009 847 857
    • (2009) Computer Communications , vol.32 , pp. 847-857
    • Kim, B.1    Kim, H.2    Bahk, S.3
  • 25
    • 84888315965 scopus 로고    scopus 로고
    • A novel hybrid intrusion detection method integrating anomaly detection with misuse detection
    • Kim G., Lee S., Kim S. A novel hybrid intrusion detection method integrating anomaly detection with misuse detection Expert Systems with Applications 41 2014 1690 1700
    • (2014) Expert Systems with Applications , vol.41 , pp. 1690-1700
    • Kim, G.1    Lee, S.2    Kim, S.3
  • 28
    • 80052025073 scopus 로고    scopus 로고
    • Self-adaptive and dynamic clustering for online anomaly detection
    • Lee S., Kim G., Kim S. Self-adaptive and dynamic clustering for online anomaly detection Expert Systems with Applications 38 2011 14891 14898
    • (2011) Expert Systems with Applications , vol.38 , pp. 14891-14898
    • Lee, S.1    Kim, G.2    Kim, S.3
  • 29
    • 82455199118 scopus 로고    scopus 로고
    • Improved competitive learning neural networks for network intrusion and fraud detection
    • Lei J.Z., Ghorbani A.A. Improved competitive learning neural networks for network intrusion and fraud detection Neurocomputing 75 2012 135 145
    • (2012) Neurocomputing , vol.75 , pp. 135-145
    • Lei, J.Z.1    Ghorbani, A.A.2
  • 33
    • 84907567316 scopus 로고    scopus 로고
    • Traffic anomaly diagnosis in Internet backbone networks: A survey
    • Marnerides A.K., Schaeffer-Filho A., Mauthe A. Traffic anomaly diagnosis in Internet backbone networks: A survey Computer Networks 73 2014 224 243
    • (2014) Computer Networks , vol.73 , pp. 224-243
    • Marnerides, A.K.1    Schaeffer-Filho, A.2    Mauthe, A.3
  • 36
    • 8344231659 scopus 로고    scopus 로고
    • InMon corporation's sFlow: A method for monitoring traffic in switched and routed networks
    • Phaal P., Panchen S., McKee N. InMon corporation's sFlow: A method for monitoring traffic in switched and routed networks RFC 3176 2001
    • (2001) RFC 3176
    • Phaal, P.1    Panchen, S.2    McKee, N.3
  • 37
    • 0027332160 scopus 로고
    • On the use of the normalized mean square error in evaluating dispersion model performance
    • Poli A.A., Cirillo M.C. On the use of the normalized mean square error in evaluating dispersion model performance Atmospheric Environment. Part A. General Topics 27 1993 2427 2434
    • (1993) Atmospheric Environment. Part A. General Topics , vol.27 , pp. 2427-2434
    • Poli, A.A.1    Cirillo, M.C.2
  • 39
    • 0023453329 scopus 로고
    • Silhouettes: A graphical aid to the interpretation and validation of cluster analysis
    • Rousseeuw P.J. Silhouettes: A graphical aid to the interpretation and validation of cluster analysis Journal of Computational and Applied Mathematics 20 1987 53 65
    • (1987) Journal of Computational and Applied Mathematics , vol.20 , pp. 53-65
    • Rousseeuw, P.J.1
  • 44
    • 84940460812 scopus 로고    scopus 로고
    • An intrusion detection system using network traffic profiling and online sequential extreme learning machine
    • Singh R., Kumar H., Singla R.K. An intrusion detection system using network traffic profiling and online sequential extreme learning machine Expert Systems with Applications 42 2015 8609 8624
    • (2015) Expert Systems with Applications , vol.42 , pp. 8609-8624
    • Singh, R.1    Kumar, H.2    Singla, R.K.3
  • 48
    • 78650558761 scopus 로고    scopus 로고
    • Temporal data clustering via weighted clustering ensemble with different representations
    • Yun Y., Ke C. Temporal data clustering via weighted clustering ensemble with different representations IEEE Transactions on Knowledge and Data Engineering 23 2011 307 320
    • (2011) IEEE Transactions on Knowledge and Data Engineering , vol.23 , pp. 307-320
    • Yun, Y.1    Ke, C.2
  • 49
    • 34250755328 scopus 로고    scopus 로고
    • Anomaly detection aiming pro-active management of computer network based on digital signature of network segment
    • Zarpelão B.B., Mendes L.d.S., Proença L.M. Jr. Anomaly detection aiming pro-active management of computer network based on digital signature of network segment Journal of Network and Systems Management 15 2007 267 283
    • (2007) Journal of Network and Systems Management , vol.15 , pp. 267-283
    • Zarpelão, B.B.1    Mendes, L.D.S.2    Proença, L.M.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.