Research Article

Network Intrusion Detection with Threat Agent Profiling

Table 5

Representatives of individual clusters, PAM with 7 clusters.

Cl.Nr.Perc.Scan.DDoSDurat.MaxIMinIISPTarg.

1370781,8720146610011
22144,735051957666134534
3390,8621051169752196082821
41012,231007473253549022
53277,2224060474908308159824
6711,572907708494034894261029
7691,521101647845105049

Notes. The second and third columns report the number and percentage of threat agents in a specific cluster, respectively. The last seven columns correspond to the following characteristics: Recon.Scanning, Availability.DDoS, duration, max. idleness, min. idleness, a number of ISP, and a number of unique targets.