2016 3rd International Conference on Recent Advances in Information Technology (RAIT) 2016
DOI: 10.1109/rait.2016.7507933
|View full text |Cite
|
Sign up to set email alerts
|

Anomaly detection in network traffic using K-mean clustering

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
21
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
4
4
1

Relationship

0
9

Authors

Journals

citations
Cited by 55 publications
(21 citation statements)
references
References 1 publication
0
21
0
Order By: Relevance
“…The various partitioning methods are distance-based. In a system, if k is the given number of partitions for construction, the partitioning method helps in creating an initial partitioning [3]. Further, the iterative relocation method is used for improving the partitioning technique with the help of moving the objects from one group to another.…”
Section: Partitioning Methodsmentioning
confidence: 99%
“…The various partitioning methods are distance-based. In a system, if k is the given number of partitions for construction, the partitioning method helps in creating an initial partitioning [3]. Further, the iterative relocation method is used for improving the partitioning technique with the help of moving the objects from one group to another.…”
Section: Partitioning Methodsmentioning
confidence: 99%
“…Initially, the k-means clustering algorithm is applied to detect DoS attacks [12]. The data set X = { 1 , … , } consists of traffic sessions .…”
Section: ) Ping Of Death (Pod) Dosmentioning
confidence: 99%
“…Limitations are present with these techniques however. Kumari et al [15] looks at a clustering technique for the use of anomaly detection over a network, setting a distance based threshold as the 100th farthest data point from the obtained cluster centroids. This threshold is a common theme across multiple anomaly detection solutions [16][17][18].…”
Section: Related Workmentioning
confidence: 99%