원문정보
초록
영어
The KDD Cup 99 dataset has been the point of attraction for many researchers in the field of intrusion detection from the last decade. Many researchers have contributed their efforts to analyze the dataset by different techniques. Analysis can be used in any type of industry that produces and consumes data, of course that includes security. This paper is an analysis of 10% of KDD cup’99 training dataset based on intrusion detection. We have focused on establishing a relationship between the attack types and the protocol used by the hackers, using clustered data. Analysis of data is performed using k-means clustering; we have used the Oracle 10g data miner as a tool for the analysis of dataset and build 1000 clusters to segment the 494,020 records. The investigation revealed many interesting results about the protocols and attack types preferred by the hackers for intruding the networks.
목차
1. Introduction
1.1. KDD CUP 99 Data Set
2. Related Work
3. Material and Methods
3.1. Data Collection
3.2. Process of Data
3.3. Tools and Techniques
3.4. Clustering
3.5. Experimental Analysis
4. Results and Discussion:
5. Conclusion
References