Use of K-mean clustering in security domain

Use of K-mean clustering in security domain

Summer Task-10 & ARTH Task 42

Github ->

What is K-means Clustering?

K-means clustering is one of the simplest and popular unsupervised machine learning algorithms. In other words, the K-means algorithm?identifies k number of centroids, and then allocates every data point to the nearest cluster, while keeping the centroids as small as possible.

Implementation of K-means clustering ->

First get the optimal number of K that is the number of optimal clusters, for getting this we can use dendrograms or visualization of the plot of MSE Vs K.

Let's look at a plot between MSE Vs K

No alt text provided for this image

Elbow point is the point from where the mean square error starts to decrease gradually. This point also indicates the optimal number of clusters to be present in the given data points.

Clustering ->

No alt text provided for this image

Optimal clusters = 3

Using K-means clustering in Security ->

Internet security has been one of the most important problems in the world. Anomaly detection is the basic method to defend new attack in intrusion detection. Network intrusion detection is the process of monitoring the events occurring in a computing system or network and analyzing them for signs of intrusions, defined as attempts to compromise the confidentiality. A wide variety of data mining techniques have been applied to intrusion detections. In data mining, clustering is the most important unsupervised learning process used to find the structures or patterns in a collection of unlabeled data. We use the K-means algorithm to cluster and analyze the data in this paper. Computer simulations show that this method can detect unknown intrusions efficiently in the real network connections.

要查看或添加评论,请登录

Yash Indane的更多文章

  • OSPF Routing Protocol using Dijkastra Algorithm

    OSPF Routing Protocol using Dijkastra Algorithm

    What is OSPF? The OSPF (Open Shortest Path First) protocol is one of a family of IP Routing protocols, and is an…

  • Using Face Recognition for automation

    Using Face Recognition for automation

    SUMMER-TASK-6 (Team Task) and ARTH TASK 38 GitHub -> In this article I will explain how we can use Face Recognition and…

    3 条评论
  • JavaScript use cases in Industry

    JavaScript use cases in Industry

    Summer Task 7.2 What is JavaScript? JavaScript, often abbreviated as JS, is a programming language that conforms to the…

    1 条评论
  • Use of confusion matrix in detecting cyber crime

    Use of confusion matrix in detecting cyber crime

    Summer 2021 Task 05 ??????? Particularly in the last decade, Internet usage has been growing rapidly. However, as the…

  • Running Chrome in Docker container

    Running Chrome in Docker container

    Summer - Task 02 ??????? By default containers don't support GUI, but by some way we can achieve that, let's discuss…

    3 条评论
  • Training a ML model inside a container

    Training a ML model inside a container

    Task 01 ??????? Task Description ?? ?? Pull the Docker container image of CentOS image from DockerHub and create a new…

    4 条评论
  • Deploying WordPress in Amazon EKS with RDS in Backend

    Deploying WordPress in Amazon EKS with RDS in Backend

    ARTH-TASK-23 WordPress is a free and open-source content management system written in PHP and paired with a MySQL or…

    3 条评论
  • How industry uses MongoDB

    How industry uses MongoDB

    ARTH-TASK-32 What is MongoDB? MongoDB is a source-available cross-platform document-oriented database program…

  • Creating a Multicloud Setup of Kubernetes using Ansible Roles

    Creating a Multicloud Setup of Kubernetes using Ansible Roles

    TASK 28 Task Description ?? ?? CREATE A MULTI-CLOUD SETUP of K8S cluster: ?? Lunch node in AWS ?? Lunch node in Azure…

    2 条评论
  • Helm and Charts in Kubernetes

    Helm and Charts in Kubernetes

    ARTH TASK 24 What are Charts ? A chart is a collection of files that describe a related set of Kubernetes resources. A…

社区洞察

其他会员也浏览了