2013
DOI: 10.1080/01969722.2013.803903
|View full text |Cite
|
Sign up to set email alerts
|

Visualization and Clustering for SNMP Intrusion Detection

Abstract: Abstract. Accurate intrusion detection still is an open challenge. Present work aims at being one step towards that purpose by studying the combination of clustering and visualization techniques. To do that, MOVICAB-IDS, previously proposed as a hybrid intelligent Intrusion Detection System (IDS) based on visualization techniques, is upgraded by adding automatic response thanks to clustering methods. To check the validity of the proposed clustering extension, it has been applied to the identification of differ… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

3
12
0

Year Published

2015
2015
2021
2021

Publication Types

Select...
5
3

Relationship

4
4

Authors

Journals

citations
Cited by 24 publications
(15 citation statements)
references
References 27 publications
3
12
0
Order By: Relevance
“…The obtained results vary from the different analyzed datasets and the behavior of the applied clustering techniques. These results are consistent with those previously obtained for other SNMP anomalous situations [6,7]. There is no distance criterion which shows the best results, hence its selection will depend on the analyzed data.…”
Section: Discussionsupporting
confidence: 94%
See 1 more Smart Citation
“…The obtained results vary from the different analyzed datasets and the behavior of the applied clustering techniques. These results are consistent with those previously obtained for other SNMP anomalous situations [6,7]. There is no distance criterion which shows the best results, hence its selection will depend on the analyzed data.…”
Section: Discussionsupporting
confidence: 94%
“…Based on successful results obtained by upgrading MOVICAB-IDS with clustering techniques to detect different attacks on packet-based data [6,7], present work focuses on flow-based data. Hence, present work proposes the combination of MOVICAB-IDS and different clustering techniques to analyze a database of flow-based attack situations, generated by the University of Twente [8].…”
Section: Introductionmentioning
confidence: 99%
“…The obtained results vary from the different segments and the behaviour of the applied clustering techniques. These results are consistent with those previously obtained for packet-based data [6,7]. There is not a distance criterion which obtains the best results, hence its selection depends on the analysed data.…”
Section: Discussionsupporting
confidence: 91%
“…Those datasets have also been used in our study, as described further on in the article. In [29], clustering and visualization techniques have been combined to generate an automatic response to the previously developed MOVICAB-IDS system. The modified MOVICAB-IDS has been applied to the three datasets, to assess the improvement of the proposed approach.…”
Section: Literature Reviewmentioning
confidence: 99%