Abstract

Considering that intrusion detection systems and anomaly clearly recognize malicious activity. Nowadays, data mining based intrusion detection systems, security and more rapidly detect attacks.Therefore,in this article we use a combination of k-means clustering algorithm and is used supervised support vector machine algorithm to find the best line separator. This is leading to the separation of normal and attack traffic.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call