Smart Grid and Internet of Things. Second EAI International Conference, SGIoT 2018, Niagara Falls, ON, Canada, July 11, 2018, Proceedings

Research Article

Effectiveness of Hard Clustering Algorithms for Securing Cyber Space

Download
193 downloads
  • @INPROCEEDINGS{10.1007/978-3-030-05928-6_11,
        author={Sakib Khandaker and Afzal Hussain and Mohiuddin Ahmed},
        title={Effectiveness of Hard Clustering Algorithms for Securing Cyber Space},
        proceedings={Smart Grid and Internet of Things. Second EAI International Conference, SGIoT 2018, Niagara Falls, ON, Canada, July 11, 2018, Proceedings},
        proceedings_a={SGIOT},
        year={2019},
        month={1},
        keywords={Network traffic analysis Cyber attacks Unsupervised clustering Big data},
        doi={10.1007/978-3-030-05928-6_11}
    }
    
  • Sakib Khandaker
    Afzal Hussain
    Mohiuddin Ahmed
    Year: 2019
    Effectiveness of Hard Clustering Algorithms for Securing Cyber Space
    SGIOT
    Springer
    DOI: 10.1007/978-3-030-05928-6_11
Sakib Khandaker,*, Afzal Hussain,*, Mohiuddin Ahmed,*
    *Contact email: sakibmahtab@iut-dhaka.edu, afzalhussain@iut-dhaka.edu, m.ahmed.au@ieee.org

    Abstract

    In the era of big data, it is more challenging than before to accurately identify cyber attacks. The characteristics of big data create constraints for the existing network anomaly detection techniques. Among these techniques, unsupervised algorithms are superior than the supervised algorithms for not requiring training data. Among the unsupervised techniques, hard clustering is widely accepted for deployment. Therefore, in this paper, we investigated the effectiveness of different hard clustering techniques for identification of a range of state-of-the-art cyber attacks such as etc. from the popular UNSW-NB15 dataset. The existing literature only provides the accuracy of identification of the all types of attacks in generic fashion, however, our investigation ensures the effectiveness of hard clustering for individual attacks. The experimental results reveal the performance of a number of hard clustering techniques. The insights from this paper will help both the cyber security and data science community to design robust techniques for securing cyber space.