Multiobjective evolutionary clustering approach to security vulnerability assesments

Research output: Book chapterConference contributionpeer-review

6 Citations (Scopus)

Abstract

Network vulnerability assessments collect large amounts of data to be further analyzed by security experts. Data mining and, particularly, unsupervised learning can help experts analyze these data and extract several conclusions. This paper presents a contribution to mine data in this security domain. We have implemented an evolutionary multiobjective approach to cluster data of security assessments. Clusters hold groups of tested devices with similar vulnerabilities to detect hidden patterns. Two different metrics have been selected as objectives to guide the discovery process. The results of this contribution are compared with other single-objective clustering approaches to confirm the value of the obtained clustering structures.

Original languageEnglish
Title of host publicationHybrid Artificial Intelligence Systems - 4th International Conference, HAIS 2009, Proceedings
Pages597-604
Number of pages8
DOIs
Publication statusPublished - 2009
Event4th International Conference on Hybrid Artificial Intelligence Systems, HAIS 2009 - Salamanca, Spain
Duration: 10 Jun 200912 Jun 2009

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume5572 LNAI
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference4th International Conference on Hybrid Artificial Intelligence Systems, HAIS 2009
Country/TerritorySpain
CitySalamanca
Period10/06/0912/06/09

Keywords

  • AI applications
  • Clustering
  • Evolutionary Algorithm
  • Multiobjective Optimization
  • Network Security
  • Unsupervised Learning

Fingerprint

Dive into the research topics of 'Multiobjective evolutionary clustering approach to security vulnerability assesments'. Together they form a unique fingerprint.

Cite this