Clustering Based Feature Selection and Outlier Analysis

Download Now
Provided by: International Journal of Computer Science and Communication Networks (IJCSCN)
Topic: Security
Format: PDF
It is impossible for any computer system to be claimed immune to network intrusions. Since there is no perfect solution to prevent intrusions from happening, it is very important to detect them at the first moment of occurrence and take actions to minimize the possible damage. This paper presents the results of an experimental study of some common intrusion detection techniques. In particular, the authors compared the three main approaches to intrusion detection: FCC, Y-means, and UAD. This paper is to compare and find feasible clustering algorithms to achieve good performance with high efficiency while dealing with the intrusions.
Download Now

Find By Topic