Detail publikace
Traffic Similarity Observation Using a Genetic Algorithm and Clustering
OUJEZSKÝ, V. HORVÁTH, T.
Originální název
Traffic Similarity Observation Using a Genetic Algorithm and Clustering
Anglický název
Traffic Similarity Observation Using a Genetic Algorithm and Clustering
Jazyk
en
Originální abstrakt
This article presents a technique of traffic similarity observation based on the statistical method of survival analysis by using a genetic algorithm. The basis comes from the k-means clustering algorithm. The observed traffic is collected from different network sources by using a NetFlow collector. The purpose of this technique is to propose a process of finding spread malicious traffic, e.g., ransomware, and considers the possibility of implementing a genetic-based algorithm. In our solution, a chromosome is created from clustering k-means centers, and the Davies–Bouldin validity index is used as the second fitness value in the solution.
Anglický abstrakt
This article presents a technique of traffic similarity observation based on the statistical method of survival analysis by using a genetic algorithm. The basis comes from the k-means clustering algorithm. The observed traffic is collected from different network sources by using a NetFlow collector. The purpose of this technique is to propose a process of finding spread malicious traffic, e.g., ransomware, and considers the possibility of implementing a genetic-based algorithm. In our solution, a chromosome is created from clustering k-means centers, and the Davies–Bouldin validity index is used as the second fitness value in the solution.
Plný text v Digitální knihovně
Dokumenty
BibTex
@article{BUT138952,
author="Václav {Oujezský} and Tomáš {Horváth}",
title="Traffic Similarity Observation Using a Genetic Algorithm and Clustering
",
annote="This article presents a technique of traffic similarity observation based on the statistical method of survival analysis by using a genetic algorithm. The basis comes from the k-means clustering algorithm. The observed traffic is collected from different network sources by using a NetFlow collector. The purpose of this technique is to propose a process of finding spread malicious traffic, e.g., ransomware, and considers the possibility of implementing a genetic-based algorithm. In our solution, a chromosome is created from clustering k-means centers, and the Davies–Bouldin validity index is used as the second fitness value in the solution.",
address="MDPI",
chapter="138952",
doi="10.3390/technologies6040103",
howpublished="online",
institution="MDPI",
number="4",
volume="6",
year="2018",
month="november",
pages="1--10",
publisher="MDPI",
type="journal article in Web of Science"
}