SPIT Detection in Telephony over IP Using K-Means Algorithm
نویسندگان
چکیده
منابع مشابه
Voice Over IP - Security and SPIT
Voice-over-IP (VoIP) has become an attractive alternative to the plain old telephone system, especially due to the much lower communication costs. However, there are several threats. In this document, several such threats are discussed. Moreover, we ask whether these systems could be used in environments with very high security demands as they for example exist in the Swiss army. ∗Computer Syst...
متن کاملK+ Means : An Enhancement Over K-Means Clustering Algorithm
K-means (MacQueen, 1967) [1] is one of the simplest unsupervised learning algorithms that solve the well-known clustering problem. The procedure follows a simple and easy way to classify a given data set to a predefined, say K number of clusters. Determination of K is a difficult job and it is not known that which value of K can partition the objects as per our intuition. To overcome this probl...
متن کاملPersistent K-Means: Stable Data Clustering Algorithm Based on K-Means Algorithm
Identifying clusters or clustering is an important aspect of data analysis. It is the task of grouping a set of objects in such a way those objects in the same group/cluster are more similar in some sense or another. It is a main task of exploratory data mining, and a common technique for statistical data analysis This paper proposed an improved version of K-Means algorithm, namely Persistent K...
متن کاملVisualize Network Anomaly Detection by Using K-means Clustering Algorithm
With the ever increasing amount of new attacks in today’s world the amount of data will keep increasing, and because of the base-rate fallacy the amount of false alarms will also increase. Another problem with detection of attacks is that they usually isn’t detected until after the attack has taken place, this makes defending against attacks hard and can easily lead to disclosure of sensitive i...
متن کاملAdaptive Distributed Intrusion Detection using Hybrid K-means SVM Algorithm
Assuring secure and reliable operation of networks has become a priority research area these days because of ever growing dependency on network technology. Intrusion detection systems (IDS) are used as the last line of defence. IDS identifies patterns of known intrusions (misuse detection) or differentiates anomalous network data from normal data (anomaly detection). In this paper, a novel Intr...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Procedia Computer Science
سال: 2019
ISSN: 1877-0509
DOI: 10.1016/j.procs.2019.01.027