Identifying Network Anomalies Using Clustering Technique in Weblog Data
Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2012, Vol 2, Issue 3
Abstract
In this paper we present an approach for identifying networkanomalies by visualizing network flow data which is stored inweblogs. Various clustering techniques can be used to identifydifferent anomalies in the network. Here, we present a newapproach based on simple K-Means for analyzing networkflow data using different attributes like IP address, Protocol,Port number etc. to detect anomalies. By using visualization,we can identify which sites are more frequently accessed bythe users. In our approach we provide overview about givendataset by studying network key parameters. In this processwe used preprocessing techniques to eliminate unwantedattributes from weblog data.
Authors and Affiliations
Kiran bejjanki, A. Bhaskar
Time Effective Vehicle Booking: A Novel Data Online Cluster Search Recommender System
In mundane life of everyone, people are tending towards extracting some external knowledge provided by recommendations so as to get decisive about an artifact of interest. Recommender systems or sometimes also called as...
Comparative Analysis of Color Video Enhancment Techniques
Contrast enhancement has an important role in image processing applications. This paper presents a color enhancement algorithm based on adaptive filter technique. First, the proposed method is divided into three major pa...
DATA MINING IN EDUCATION FOR STUDENTS ACADEMIC PERFORMANCE: A SYSTEMATIC REVIEW
Currently there is an increasing interest in data mining and educational systems, making educational data mining as a new growing research community. Higher education, throughout the world is delivered through universiti...
A Study Paper on Performance Degradation due to Excessive Garbage Collection in Java Based Applications using Profiler
Applications are becoming more complex, more larger and demand high quality. Application Server is the component on which most of the applications are hosted. It acts in the middle tier providing lot of functionalities l...
CONCEPTUAL THREE PHASE ITERATIVE MODEL OF KDD
KDD process includes how data is stored and accessed, how andwhat algorithms can apply to large amount of data efficiently,how results can be interpreted and visualized. KDD is theprocess of identifying valid, interestin...