Intrusion detection in network flows based on an optimized clustering criterion

J Karimpour, S Lotfi… - Turkish Journal of …, 2017 - journals.tubitak.gov.tr
Graph-based intrusion detection approaches consider the network as a graph and detect
anomalies based on graph metrics. However, most of these approaches succumb to the …

Cyber-Attacks and Anomaly detection on CICIDS-2017 dataset using ER-VEC

RS Jha, K Ojha, A Mishra, R Mishra… - 2024 2nd International …, 2024 - ieeexplore.ieee.org
Securing a network the preliminary defense mechanisms of applied Security Compliance
along with IDS (Intrusion Detection System) and IPS (Intrusion Prevention System) that are …

Clustering algorithm based on outlier detection for anomaly intrusion detection

SN Yin, HS Kang, SR Kim - 網際網路技術學刊, 2016 - airitilibrary.com
Many experiments show that outliers have important implications for clustering. However,
Most of the clustering algorithm ignores to compute outliers, or does not detect outliers well …

[PDF][PDF] An optimized approach toward intrusion detection using cluster-like behavior of attacks

AT Siahmarzkooh, J Karimpour, S Lotfi - International Journal of …, 2016 - academia.edu
Most of intrusion detection researches suffer from the following drawbacks: Dependencies
between network nodes and cluster-like behavior of anomalies. Hence, this paper proposes …