Using clustering to capture attackers
Created by W.Langdon from
gp-bibliography.bib Revision:1.8051
- @InProceedings{Shetty:2016:ICICT,
-
author = "Nisha P. Shetty",
-
booktitle = "2016 International Conference on Inventive Computation
Technologies (ICICT)",
-
title = "Using clustering to capture attackers",
-
year = "2016",
-
volume = "3",
-
abstract = "As the attackers nowadays are getting craftier it is
deemed important to have a security system which is
easy to maintain and economically affordable and gives
suitable defence against attacks both known and novel.
In this paper, the concept of genetic programming is
applied to recreate open network conditions, using
records obtained from KDD Cup'99 dataset. Then the
newly created records (network log headers) are
assimilated in normal and attack categories using the
basic fundamental of clustering i.e. intra-cluster
similarity and inter-cluster dissimilarity. Finally
results of two prominent partition based clustering
approaches i.e. K-Means and K-Medoid are compared and
evaluated.",
-
keywords = "genetic algorithms, genetic programming",
-
DOI = "doi:10.1109/INVENTIVE.2016.7830117",
-
month = aug,
-
notes = "Also known as \cite{7830117}",
- }
Genetic Programming entries for
Nisha P Shetty
Citations