K-Means Clustering in Security Domain

K-Means Clustering in Security Domain

K-Means Clustering:-

K-means clustering is one of the simplest and popular unsupervised machine learning algorithms. Typically, unsupervised algorithms make inferences from datasets using only input vectors without referring to known, or labeled, outcomes.

It allows us to cluster the data into different groups and is a convenient way to discover the categories of groups in the unlabeled dataset on its own without the need for any training. It is a centroid-based algorithm, where each cluster is associated with a centroid. The main aim of this algorithm is to minimize the sum of distances between the data point and their corresponding clusters.

How it Works:-

No alt text provided for this image

The k-means?clustering?algorithm mainly performs two tasks:

  • Determines the best value for K center points or centroids by an iterative process.
  • Assigns each data point to its closest k-center. Those data points which are near to the particular k-center, create a cluster.

No alt text provided for this image

Cyber Crime:-

A cybercrime detection is a?process of investigating, analyzing, and recovering critical forensic digital data from the networks involved in the attack,?this could be the Internet and/or a local network—to identify the authors of the digital crime and their true intentions.

???Crime Analysis:-

No alt text provided for this image

The procedure is:

1. First, we take the crime dataset

2. Filter dataset according to requirement and create a new dataset which has attributes according to analysis to be done.

3. Read the excel file of the crime dataset and apply “Replace Missing value operator” on it and execute the operation.

4. Perform “Normalize operator” on the resultant dataset and execute the operation.

5. Perform k means clustering on the resultant dataset formed after normalization and execute the operation.

6. From the plot view of the result plot data between crimes and get the required cluster.

7. Analysis can be done on the cluster formed.



???Crime Detection:-

No alt text provided for this image

Using the steps mentioned in the flow chart, we can create a cluster.

For eg., we have some dataset, and after analyzing it — we got the following cluster.

No alt text provided for this image

The cluster is been found by repeating the process iteratively until our centroids become static. The algorithm has converged recalculating distances, reassigning cases until clusters result in no change. This is the final solution. The two different clusters are labeled with two different colors blue and red. Cluster 1 is blue in color and cluster 2 is red in color. The position of the centroids change given by yellow color.

Conclusion:-

The K-Means Clustering was able to identify the crime patterns from a large number of crimes making the job for crime detectives easier.?The proposed idea has promising value?in the current complex crime and can be used as an effective tool by crime detectives and enforcement of law organizations for crime detection.

Thank You??

要查看或添加评论,请登录

Kalyani Verma的更多文章

  • Day 06 to 09: Coding Problems

    Day 06 to 09: Coding Problems

    I covered 3 topics in these 4 days which are Sliding Window, Recursion, and Dynamic Programming, and below are the 12…

    2 条评论
  • Day 04 & 05: Coding Problems

    Day 04 & 05: Coding Problems

    I solved 6 problems from the topics Recursion and Binary Tree: Generate all Binary Strings (Recursion) Left View of…

  • Day 02 & 03: Coding Problems

    Day 02 & 03: Coding Problems

    I solved 6 problems from topic Stack, Linear Search, and Recursion: Asteroid Collision (Stack) Kth Missing Positive…

  • Day 01: Binary Search on Answers

    Day 01: Binary Search on Answers

    I have solved three problems using Binary Search: Koko Eating Bananas Minimum Days to Make M Bouquets Find the Smallest…

  • Case Study: MongoDB

    Case Study: MongoDB

    ?? About MongoDB:- MongoDB is a document-oriented database that stores data in JSON-like documents with dynamic schema.…

  • Use of JavaScript in Game Creation

    Use of JavaScript in Game Creation

    What is JavaScript? JavaScript is a scripting or programming language that allows you to implement complex features on…

  • Confusion Matrix in Cyber Attack Detection

    Confusion Matrix in Cyber Attack Detection

    ? What is Cyber Attack? A cyber attack is an assault launched by cybercriminals using one or more computers against…

  • Integration of ML with Docker

    Integration of ML with Docker

    So, here are some steps for the deployment of ML model on Docker:- Step 1:- Pulling CentOS image from DockerHub docker…

    2 条评论
  • Configuration of Web Server in Docker Container using Ansible

    Configuration of Web Server in Docker Container using Ansible

    In this article, I have shown the steps to configure Web Server using "httpd" image of docker using Ansible automation.…

    5 条评论
  • Case Study: How Kubernetes is helping in Education

    Case Study: How Kubernetes is helping in Education

    What is Kubernetes? Kubernetes is a portable, extensible, open-source platform for managing containerized workloads and…