Research Article

Covert Network Analysis for Key Player Detection and Event Prediction Using a Hybrid Classifier

Table 10

Outlier detection results on cyber attackers network.

S. number Hour of time out Hour of time in Result

1 7 15 Normal
2 13 15 Normal
3 18 16 Normal
4 1 13 Outlier
5 20 10 Normal
6 8 8 Normal
7 20 8 Normal
8 20 19 Normal
9 7 18 Normal
10 12 8 Normal
11 17 11 Normal
12 10 10 Normal
13 12 20 Normal
14 17 17 Normal
15 20 14 Normal
16 19 15 Normal
17 19 17 Normal
18 13 11 Normal
19 18 17 Normal
20 16 15 Normal
21 21 21 Normal
22 15 15 Normal
23 13 13 Normal
24 20 15 Normal
25 18 18 Normal
26 10 19 Normal
27 18 16 Normal
28 19 18 Normal
29 10 16 Normal
30 1 17 Normal
31 21 20 Normal
32 12 20 Normal
33 22 16 Normal
34 23 23 Normal
35 5 23 Normal
36 9 9 Normal
37 18 14 Normal
38 20 8 Outlier
39 18 18 Normal
40 23 17 Normal
41 23 23 Outlier
42 19 15 Normal
43 12 18 Normal
44 7 13 Normal
45 14 9 Normal
46 21 17 Normal
47 13 15 Normal