Detail publikace

Traffic Similarity Observation Using a Genetic Algorithm and Clustering

OUJEZSKÝ, V. HORVÁTH, T.

Originální název

Traffic Similarity Observation Using a Genetic Algorithm and Clustering

Anglický název

Traffic Similarity Observation Using a Genetic Algorithm and Clustering

Jazyk

en

Originální abstrakt

This article presents a technique of traffic similarity observation based on the statistical method of survival analysis by using a genetic algorithm. The basis comes from the k-means clustering algorithm. The observed traffic is collected from different network sources by using a NetFlow collector. The purpose of this technique is to propose a process of finding spread malicious traffic, e.g., ransomware, and considers the possibility of implementing a genetic-based algorithm. In our solution, a chromosome is created from clustering k-means centers, and the Davies–Bouldin validity index is used as the second fitness value in the solution.

Anglický abstrakt

This article presents a technique of traffic similarity observation based on the statistical method of survival analysis by using a genetic algorithm. The basis comes from the k-means clustering algorithm. The observed traffic is collected from different network sources by using a NetFlow collector. The purpose of this technique is to propose a process of finding spread malicious traffic, e.g., ransomware, and considers the possibility of implementing a genetic-based algorithm. In our solution, a chromosome is created from clustering k-means centers, and the Davies–Bouldin validity index is used as the second fitness value in the solution.

Plný text v Digitální knihovně

Dokumenty

BibTex


@article{BUT138952,
  author="Václav {Oujezský} and Tomáš {Horváth}",
  title="Traffic Similarity Observation Using a Genetic Algorithm and Clustering
",
  annote="This article presents a technique of traffic similarity observation based on the statistical method of survival analysis by using a genetic algorithm. The basis comes from the k-means clustering algorithm. The observed traffic is collected from different network sources by using a NetFlow collector. The purpose of this technique is to propose a process of finding spread malicious traffic, e.g., ransomware, and considers the possibility of implementing a genetic-based algorithm. In our solution, a chromosome is created from clustering k-means centers, and the Davies–Bouldin validity index is used as the second fitness value in the solution.",
  address="MDPI",
  chapter="138952",
  doi="10.3390/technologies6040103",
  howpublished="online",
  institution="MDPI",
  number="4",
  volume="6",
  year="2018",
  month="november",
  pages="1--10",
  publisher="MDPI",
  type="journal article in Web of Science"
}