Research Article
Effectiveness of Hard Clustering Algorithms for Securing Cyber Space
@INPROCEEDINGS{10.1007/978-3-030-05928-6_11, author={Sakib Khandaker and Afzal Hussain and Mohiuddin Ahmed}, title={Effectiveness of Hard Clustering Algorithms for Securing Cyber Space}, proceedings={Smart Grid and Internet of Things. Second EAI International Conference, SGIoT 2018, Niagara Falls, ON, Canada, July 11, 2018, Proceedings}, proceedings_a={SGIOT}, year={2019}, month={1}, keywords={Network traffic analysis Cyber attacks Unsupervised clustering Big data}, doi={10.1007/978-3-030-05928-6_11} }
- Sakib Khandaker
Afzal Hussain
Mohiuddin Ahmed
Year: 2019
Effectiveness of Hard Clustering Algorithms for Securing Cyber Space
SGIOT
Springer
DOI: 10.1007/978-3-030-05928-6_11
Abstract
In the era of big data, it is more challenging than before to accurately identify cyber attacks. The characteristics of big data create constraints for the existing network anomaly detection techniques. Among these techniques, unsupervised algorithms are superior than the supervised algorithms for not requiring training data. Among the unsupervised techniques, hard clustering is widely accepted for deployment. Therefore, in this paper, we investigated the effectiveness of different hard clustering techniques for identification of a range of state-of-the-art cyber attacks such as etc. from the popular UNSW-NB15 dataset. The existing literature only provides the accuracy of identification of the all types of attacks in generic fashion, however, our investigation ensures the effectiveness of hard clustering for individual attacks. The experimental results reveal the performance of a number of hard clustering techniques. The insights from this paper will help both the cyber security and data science community to design robust techniques for securing cyber space.