Clustering of windows security events by means of frequent pattern mining

1Citations
Citations of this article
9Readers
Mendeley users who have this article in their library.
Get full text

Abstract

This paper summarizes the results obtained from the application of Data Mining techniques in order to detect usual behaviors in the use of computers. For that, based on real security event logs, two different clustering strategies have been developed. On the one hand, a clustering process has been carried out taking into account the characteristics that define the events in a quantitative way. On the other hand, an approach based on qualitative aspects has been developed, mainly based on the interruptions among security events. Both approaches have shown to be effective and complementary in order to cluster security audit trails of Windows systems and extract useful behavior patterns. © Springer-Verlag Berlin Heidelberg 2009.

Cite

CITATION STYLE

APA

Basagoiti, R., Zurutuza, U., Aztiria, A., Santafé, G., & Reyes, M. (2009). Clustering of windows security events by means of frequent pattern mining. In Advances in Intelligent and Soft Computing (Vol. 63 AISC, pp. 19–27). https://doi.org/10.1007/978-3-642-04091-7_3

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free