dc.contributorLima, João Vicente Ferreira
dc.creatorGonçalves, Adonai Gabriel Loreto Peres
dc.date.accessioned2021-10-22T18:44:25Z
dc.date.accessioned2022-10-07T22:23:58Z
dc.date.available2021-10-22T18:44:25Z
dc.date.available2022-10-07T22:23:58Z
dc.date.created2021-10-22T18:44:25Z
dc.date.issued2021-09-02
dc.identifierhttp://repositorio.ufsm.br/handle/1/22520
dc.identifier.urihttp://repositorioslatinoamericanos.uchile.cl/handle/2250/4037112
dc.description.abstractNetwork anomalies are frequent, unexpected and sudden deviations in data traffic. They may indicate a user spike, a system malfunction, or a cyberattack. One of the methods for anomaly detection is the use of clustering algorithms. These algorithms aim to group a dataset so that each cluster is distinguishable in relation to the others. With the intent of mitigating malicious agents’ attacks and better comprehending the network anomaly detection process, this paper presents a study of three clustering algorithms (k-Means, MCL and k-Shape), being used for detecting and classifying the anomalies, a network analysis branch in which the MCL and k-Shape algorithms have not been used before. After training and selecting the best hyperparameters, it was concluded that, considering the three implementations used, despite the MCL algorithm having obtained the best result in detecting benign events and the k-Shape having obtained the best accuracy, the k-Means algorithm is the best option, as it achieved an accuracy similar to k-Shape and a runtime more than ten times shorter.
dc.publisherUniversidade Federal de Santa Maria
dc.publisherBrasil
dc.publisherUFSM
dc.publisherCentro de Tecnologia
dc.rightshttp://creativecommons.org/licenses/by-nc-nd/4.0/
dc.rightsAcesso Aberto
dc.rightsAttribution-NonCommercial-NoDerivatives 4.0 International
dc.subjectAlgoritmos de agrupamento
dc.subjectAnomalias de rede
dc.subjectTráfego de dados
dc.subjectAnálise de arquivos de log
dc.subjectRedes de computadores
dc.titleUtilização de algoritmos de agrupamento para detecção de anomalias em redes de computadores
dc.typeTrabalho de Conclusão de Curso de Graduação


Este ítem pertenece a la siguiente institución