This paper describes the advantages of using the anomaly detection approach over the misuse detection technique in detecting unknown network intrusions or attacks. It also investigates the performance of various clustering algorithms when applied to anomaly...
CITATION STYLE
Syarif, I., Prugel-Bennett, A., & Wills, G. (2012). Unsupervised Clustering Approach for Network Anomaly Detection (pp. 135–145). https://doi.org/10.1007/978-3-642-30507-8_13
Mendeley helps you to discover research relevant for your work.