6 Efficient Feature Grouping for IDS Using Clustering Algorithms in Detecting Known/Unknown Attacks

Ravishanker, Monica Sood, Prikshat Angra, Sahil Verma, Kavita, and NZ Jhanjhi

CONTENTS

  1. 6.1 Introduction
  2. 6.2 Related Work
  3. 6.3 Design Methodology
  4. 6.4 Applications and Future Work
  5. 6.5 Conclusion
  6. References

DOI: 10.1201/9780367808228-6

6.1 Introduction

With the exponential increase in the growth of networks and diverse devices, it becomes a very complex task to manage network and its traffic flow. Due to the introduction of new protocols and newer technologies, a newer mechanism with real-time monitoring and controlling abilities is required to cope with these newer high-speed networking devices and networks. For smaller networks, similar aspects ...

Get Information Security Handbook now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.