马笼头 发表于 2025-3-30 09:32:45
http://reply.papertrans.cn/32/3116/311547/311547_51.pngTremor 发表于 2025-3-30 12:33:25
Automatic Clustering of Malicious IP Flow Records Using Unsupervised Learning,. We analyze IP flows in every cluster and assign an attack label to them. After the clusters are created, an incoming malicious IP flow is compared with all clusters and the label of the closest cluster is assigned to the IP flow. The intrusion detection system uses labeled flows to raise consolida小隔间 发表于 2025-3-30 18:54:14
http://reply.papertrans.cn/32/3116/311547/311547_53.png大方不好 发表于 2025-3-31 00:11:18
http://reply.papertrans.cn/32/3116/311547/311547_54.png