Research Article
Network Intrusion Detection with Threat Agent Profiling
Table 9
Representatives of individual clusters without outliers, -means and PAM with 7 clusters.
| |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Notes. The second and third columns report the number and percentage of threat agents in a specific cluster, respectively. The last six columns correspond to the following characteristics: Recon.Scanning, duration, max. idleness, min. idleness, a number of ISP, and a number of unique targets. |