About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
Smart Grid and Internet of Things. Second EAI International Conference, SGIoT 2018, Niagara Falls, ON, Canada, July 11, 2018, Proceedings

Research Article

Effectiveness of Hard Clustering Algorithms for Securing Cyber Space

Download(Requires a free EAI acccount)
359 downloads
Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.1007/978-3-030-05928-6_11,
        author={Sakib Khandaker and Afzal Hussain and Mohiuddin Ahmed},
        title={Effectiveness of Hard Clustering Algorithms for Securing Cyber Space},
        proceedings={Smart Grid and Internet of Things. Second EAI International Conference, SGIoT 2018, Niagara Falls, ON, Canada, July 11, 2018, Proceedings},
        proceedings_a={SGIOT},
        year={2019},
        month={1},
        keywords={Network traffic analysis Cyber attacks Unsupervised clustering Big data},
        doi={10.1007/978-3-030-05928-6_11}
    }
    
  • Sakib Khandaker
    Afzal Hussain
    Mohiuddin Ahmed
    Year: 2019
    Effectiveness of Hard Clustering Algorithms for Securing Cyber Space
    SGIOT
    Springer
    DOI: 10.1007/978-3-030-05928-6_11
Sakib Khandaker,*, Afzal Hussain,*, Mohiuddin Ahmed,*
    *Contact email: sakibmahtab@iut-dhaka.edu, afzalhussain@iut-dhaka.edu, m.ahmed.au@ieee.org

    Abstract

    In the era of big data, it is more challenging than before to accurately identify cyber attacks. The characteristics of big data create constraints for the existing network anomaly detection techniques. Among these techniques, unsupervised algorithms are superior than the supervised algorithms for not requiring training data. Among the unsupervised techniques, hard clustering is widely accepted for deployment. Therefore, in this paper, we investigated the effectiveness of different hard clustering techniques for identification of a range of state-of-the-art cyber attacks such as etc. from the popular UNSW-NB15 dataset. The existing literature only provides the accuracy of identification of the all types of attacks in generic fashion, however, our investigation ensures the effectiveness of hard clustering for individual attacks. The experimental results reveal the performance of a number of hard clustering techniques. The insights from this paper will help both the cyber security and data science community to design robust techniques for securing cyber space.

    Keywords
    Network traffic analysis Cyber attacks Unsupervised clustering Big data
    Published
    2019-01-04
    Appears in
    SpringerLink
    http://dx.doi.org/10.1007/978-3-030-05928-6_11
    Copyright © 2018–2025 ICST
    EBSCOProQuestDBLPDOAJPortico
    EAI Logo

    About EAI

    • Who We Are
    • Leadership
    • Research Areas
    • Partners
    • Media Center

    Community

    • Membership
    • Conference
    • Recognition
    • Sponsor Us

    Publish with EAI

    • Publishing
    • Journals
    • Proceedings
    • Books
    • EUDL