dc.contributor | Lima, João Vicente Ferreira | |
dc.creator | Gonçalves, Adonai Gabriel Loreto Peres | |
dc.date.accessioned | 2021-10-22T18:44:25Z | |
dc.date.accessioned | 2022-10-07T22:23:58Z | |
dc.date.available | 2021-10-22T18:44:25Z | |
dc.date.available | 2022-10-07T22:23:58Z | |
dc.date.created | 2021-10-22T18:44:25Z | |
dc.date.issued | 2021-09-02 | |
dc.identifier | http://repositorio.ufsm.br/handle/1/22520 | |
dc.identifier.uri | http://repositorioslatinoamericanos.uchile.cl/handle/2250/4037112 | |
dc.description.abstract | Network anomalies are frequent, unexpected and sudden deviations in data traffic. They
may indicate a user spike, a system malfunction, or a cyberattack. One of the methods
for anomaly detection is the use of clustering algorithms. These algorithms aim to group
a dataset so that each cluster is distinguishable in relation to the others. With the intent
of mitigating malicious agents’ attacks and better comprehending the network anomaly detection
process, this paper presents a study of three clustering algorithms (k-Means, MCL
and k-Shape), being used for detecting and classifying the anomalies, a network analysis
branch in which the MCL and k-Shape algorithms have not been used before. After training
and selecting the best hyperparameters, it was concluded that, considering the three implementations
used, despite the MCL algorithm having obtained the best result in detecting
benign events and the k-Shape having obtained the best accuracy, the k-Means algorithm
is the best option, as it achieved an accuracy similar to k-Shape and a runtime more than
ten times shorter. | |
dc.publisher | Universidade Federal de Santa Maria | |
dc.publisher | Brasil | |
dc.publisher | UFSM | |
dc.publisher | Centro de Tecnologia | |
dc.rights | http://creativecommons.org/licenses/by-nc-nd/4.0/ | |
dc.rights | Acesso Aberto | |
dc.rights | Attribution-NonCommercial-NoDerivatives 4.0 International | |
dc.subject | Algoritmos de agrupamento | |
dc.subject | Anomalias de rede | |
dc.subject | Tráfego de dados | |
dc.subject | Análise de arquivos de log | |
dc.subject | Redes de computadores | |
dc.title | Utilização de algoritmos de agrupamento para detecção de anomalias em redes de computadores | |
dc.type | Trabalho de Conclusão de Curso de Graduação | |