Network Anomaly Detection Using Co-clustering

    Encyclopedia of Social Network Analysis and Mining, pp. 403-410, 2014.

    Cited by: 35|Bibtex|Views8|Links
    EI WOS
    Keywords:
    different co-clustering algorithmearly internet architecture designsocial networknormal connectioninternet attackMore(8+)

    Abstract:

    Early Internet architecture design goals did not put security as a high priority. However, today Internet security is a quickly growing concern. The prevalence of Internet attacks has increased significantly, but still the challenge of detecting such attacks generally falls on the end hosts and service providers, requiring system administ...More

    Code:

    Data:

    Your rating :
    0

     

    Tags
    Comments