Advanced clustering based intrusion detection (ACID) algorithm

4Citations
Citations of this article
4Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Computer security or network security has become one of the biggest issues now-a-days. Intrusion Detection process detects malicious attacks which generally includes theft of information or data. Traditional IDS (Intrusion Detection System) detects only those attacks which are known to them. But they rarely detect unknown intrusions. Clustering based method may be helpful in detecting unknown attack patterns. In this paper an attempt has been made to propose a new intrusion detection method based on clustering. The algorithm is experimented with KDD99 dataset and is found to produce satisfactory results. © 2011 Springer-Verlag.

Cite

CITATION STYLE

APA

Borah, S., Chakravorty, D., Chawhan, C., & Saha, A. (2011). Advanced clustering based intrusion detection (ACID) algorithm. In Communications in Computer and Information Science (Vol. 192 CCIS, pp. 35–43). https://doi.org/10.1007/978-3-642-22720-2_4

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free