Clustering-Based Pattern Abnormality Detection in Distributed Sensor Networks
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Jang, Seok-Woo | - |
dc.contributor.author | Kim, Gye-Young | - |
dc.contributor.author | Byun, Siwoo | - |
dc.date.available | 2018-05-09T13:46:51Z | - |
dc.date.created | 2018-04-17 | - |
dc.date.issued | 2014 | - |
dc.identifier.issn | 1550-1329 | - |
dc.identifier.uri | http://scholarworks.bwise.kr/ssu/handle/2018.sw.ssu/11062 | - |
dc.description.abstract | We suggest a method of effectively detecting and classifying network traffic attacks by visualizing their IP (Internet protocol) addresses and ports and clustering the visualized ports based on their variance. The proposed approach first visualizes the IP addresses and ports of the senders and receivers into two-dimensional images. The method then analyzes the visualized images and extracts linear and/or high brightness patterns, which represent traffic attacks. Subsequently, it groups the ports using an improved clustering algorithm, allowing an artificial neural network to learn the extracted features and to automatically detect and classify normal traffic data, DDoS attacks, DoS attacks, or Internet Worms. The experiments conducted in this work prove that our suggested clustering-based algorithm effectively detects various traffic attacks. | - |
dc.publisher | HINDAWI PUBLISHING CORPORATION | - |
dc.relation.isPartOf | INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS | - |
dc.subject | HOUGH TRANSFORM | - |
dc.subject | ATTACKS | - |
dc.title | Clustering-Based Pattern Abnormality Detection in Distributed Sensor Networks | - |
dc.type | Article | - |
dc.identifier.doi | 10.1155/2014/438468 | - |
dc.type.rims | ART | - |
dc.identifier.bibliographicCitation | INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS | - |
dc.description.journalClass | 1 | - |
dc.identifier.wosid | 000334226600001 | - |
dc.identifier.scopusid | 2-s2.0-84899544772 | - |
dc.citation.title | INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS | - |
dc.contributor.affiliatedAuthor | Kim, Gye-Young | - |
dc.type.docType | Article | - |
dc.description.oadoiVersion | published | - |
dc.subject.keywordPlus | HOUGH TRANSFORM | - |
dc.subject.keywordPlus | ATTACKS | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
Soongsil University Library 369 Sangdo-Ro, Dongjak-Gu, Seoul, Korea (06978)02-820-0733
COPYRIGHT ⓒ SOONGSIL UNIVERSITY, ALL RIGHTS RESERVED.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.