Identifying Network Anomalies Using Clustering Technique in Weblog Data
DOI:
https://doi.org/10.24297/ijct.v2i3a.2675Abstract
In this paper we present an approach for identifying networkanomalies by visualizing network flow data which is stored inweblogs. Various clustering techniques can be used to identifydifferent anomalies in the network. Here, we present a newapproach based on simple K-Means for analyzing networkflow data using different attributes like IP address, Protocol,Port number etc. to detect anomalies. By using visualization,we can identify which sites are more frequently accessed bythe users. In our approach we provide overview about givendataset by studying network key parameters. In this processwe used preprocessing techniques to eliminate unwantedattributes from weblog data.Downloads
Download data is not yet available.
Downloads
Published
2012-06-30
How to Cite
bejjanki, K., & Bhaskar, A. (2012). Identifying Network Anomalies Using Clustering Technique in Weblog Data. INTERNATIONAL JOURNAL OF COMPUTERS &Amp; TECHNOLOGY, 2(3), 71–73. https://doi.org/10.24297/ijct.v2i3a.2675
Issue
Section
Research Articles