Title :
A Framework for Evaluating Clustering Algorithm
Author :
Nehinbe, Joshua Ojo
Author_Institution :
Univ. of Essex, Colchester, UK
fDate :
Nov. 30 2010-Dec. 3 2010
Abstract :
Security is an important issue for building and sustaining trust relationship in cloud computing and in the usage of web-based applications. Consequently, intrusion detectors that adopt allowable and disallowable concepts are used in network forensics. The disallowable policy enforcers alert on events that are known to be bad while the allowable policy enforcers monitor events that deviate from known good. Nevertheless, sophisticated cases of computer attacks often render attempts to isolate failed attacks from successful attacks ineffective. Thus, attacks are erroneous interpreted and most successful cases of computer attacks are not forestalled while in progress despite the huge volume of warnings that intrusion detectors generate beforehand. Therefore, we present a new clustering algorithm to lessen these problems. Series of evaluations showed how to adopt category utility to improve the efficacies of methods for detecting and preventing intrusions. The results also differentiated failed attacks on computer resources from successful attacks.
Keywords :
Internet; cloud computing; pattern clustering; security of data; Web-based applications; cloud computing; clustering algorithm evaluation; computer attacks; intrusion detection; intrusion prevention; network forensics; trust relationship; Classification algorithms; Cloud computing; Clustering algorithms; Computational modeling; Computers; Detectors; Security; Cloud computing; Maximum Transfer Unit; category utility; failed attacks; intrusion detection system;
Conference_Titel :
Cloud Computing Technology and Science (CloudCom), 2010 IEEE Second International Conference on
Conference_Location :
Indianapolis, IN
Print_ISBN :
978-1-4244-9405-7
Electronic_ISBN :
978-0-7695-4302-4
DOI :
10.1109/CloudCom.2010.90