Using clustering to capture attackers

Created by W.Langdon from gp-bibliography.bib Revision:1.3973

@InProceedings{Shetty:2016:ICICT,
  author =       "Nisha P. Shetty",
  booktitle =    "2016 International Conference on Inventive Computation
                 Technologies (ICICT)",
  title =        "Using clustering to capture attackers",
  year =         "2016",
  volume =       "3",
  abstract =     "As the attackers nowadays are getting craftier it is
                 deemed important to have a security system which is
                 easy to maintain and economically affordable and gives
                 suitable defence against attacks both known and novel.
                 In this paper, the concept of genetic programming is
                 applied to recreate open network conditions, using
                 records obtained from KDD Cup'99 dataset. Then the
                 newly created records (network log headers) are
                 assimilated in normal and attack categories using the
                 basic fundamental of clustering i.e. intra-cluster
                 similarity and inter-cluster dissimilarity. Finally
                 results of two prominent partition based clustering
                 approaches i.e. K-Means and K-Medoid are compared and
                 evaluated.",
  keywords =     "genetic algorithms, genetic programming",
  DOI =          "doi:10.1109/INVENTIVE.2016.7830117",
  month =        aug,
  notes =        "Also known as \cite{7830117}",
}

Genetic Programming entries for Nisha P Shetty

Citations