The Community for Technology Leaders
2010 Second World Congress on Software Engineering (2010)
Wuhan, Hubei China
Dec. 19, 2010 to Dec. 20, 2010
ISBN: 978-0-7695-4303-1
pp: 130-133
A server needs strong security systems. For this goal, a new perspective to network security is won by using data mining paradigms like outlier detection, clustering and classification. This study uses K-Nearest Neighbor (KNN) algorithm for clustering and classification. KNN algorithm needs data warehouse which impersonates user profiles to cluster. Therefore, requested time intervals and requested IPs with text mining are used for user profiles. Users in the network are clustered by calculating optimum k and threshold parameters of KNN algorithm. Finally, over these clusters, new requests are separated as outlier or normal by different threshold values with different priority weight values and average similarities with different priority weight values.
Outlier detection, k-nearest neighbor clustering and classification, network security and similarity measurement

Y. Dogan and G. Dalkiliç, "Outlier Detection with Double-Sided Control Mechanism and Different Priority Weight Values for Network Security," 2010 Second World Congress on Software Engineering(WCSE), Wuhan, Hubei China, 2010, pp. 130-133.
89 ms
(Ver 3.3 (11022016))