Application of Clustering Techniques in a Network Security Testing System

  • Authors:
  • Guiomar Corral;Elisabet Golobardes;Oriol Andreu;Isard Serra;Elisabet Maluquer;Àngel Martínez

  • Affiliations:
  • Enginyeria i Arquitectura La Salle-Universitat Ramon Llull, Phone: 00 34 932902423 Fax: 00 34 93211100-c/Quatre Camins 2, 08022 Barcelona, {guiomar, elisabet, oandreu, iserra, emaluquer, angelm}@s ...;Enginyeria i Arquitectura La Salle-Universitat Ramon Llull, Phone: 00 34 932902423 Fax: 00 34 93211100-c/Quatre Camins 2, 08022 Barcelona, {guiomar, elisabet, oandreu, iserra, emaluquer, angelm}@s ...;Enginyeria i Arquitectura La Salle-Universitat Ramon Llull, Phone: 00 34 932902423 Fax: 00 34 93211100-c/Quatre Camins 2, 08022 Barcelona, {guiomar, elisabet, oandreu, iserra, emaluquer, angelm}@s ...;Enginyeria i Arquitectura La Salle-Universitat Ramon Llull, Phone: 00 34 932902423 Fax: 00 34 93211100-c/Quatre Camins 2, 08022 Barcelona, {guiomar, elisabet, oandreu, iserra, emaluquer, angelm}@s ...;Enginyeria i Arquitectura La Salle-Universitat Ramon Llull, Phone: 00 34 932902423 Fax: 00 34 93211100-c/Quatre Camins 2, 08022 Barcelona, {guiomar, elisabet, oandreu, iserra, emaluquer, angelm}@s ...;Enginyeria i Arquitectura La Salle-Universitat Ramon Llull, Phone: 00 34 932902423 Fax: 00 34 93211100-c/Quatre Camins 2, 08022 Barcelona, {guiomar, elisabet, oandreu, iserra, emaluquer, angelm}@s ...

  • Venue:
  • Proceedings of the 2005 conference on Artificial Intelligence Research and Development
  • Year:
  • 2005

Quantified Score

Hi-index 0.00

Visualization

Abstract

Security has become a main concern in corporate networks. In order to keep a network protected it is necessary to periodically perform security tests to control devices and services, and also identify possible vulnerabilities. Never two networks behave the same way; thus, results obtained from security tests may substantially differ from one to another. In this case, trying to manually find a behavior pattern for all networks becomes a difficult task. Unsupervised techniques can help security analysts finding certain devices patterns, and also help revealing hidden problems in network security. This paper proposes a solution based on unsupervised techniques to help security analysts handling all the information obtained from security tests in order to detect abnormal groups of devices or atypical system behaviors.