<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="static/style.xsl"?><OAI-PMH xmlns="http://www.openarchives.org/OAI/2.0/" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.openarchives.org/OAI/2.0/ http://www.openarchives.org/OAI/2.0/OAI-PMH.xsd"><responseDate>2026-04-28T11:31:42Z</responseDate><request verb="GetRecord" identifier="oai:riubu.ubu.es:10259/3859" metadataPrefix="qdc">https://riubu.ubu.es/oai/request</request><GetRecord><record><header><identifier>oai:riubu.ubu.es:10259/3859</identifier><datestamp>2022-12-20T11:20:01Z</datestamp><setSpec>com_10259_3847</setSpec><setSpec>com_10259_5086</setSpec><setSpec>com_10259_2604</setSpec><setSpec>col_10259_3848</setSpec></header><metadata><qdc:qualifieddc xmlns:qdc="http://dspace.org/qualifieddc/" xmlns:doc="http://www.lyncode.com/xoai" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:dcterms="http://purl.org/dc/terms/" xmlns:dc="http://purl.org/dc/elements/1.1/" xsi:schemaLocation="http://purl.org/dc/elements/1.1/ http://dublincore.org/schemas/xmls/qdc/2006/01/06/dc.xsd http://purl.org/dc/terms/ http://dublincore.org/schemas/xmls/qdc/2006/01/06/dcterms.xsd http://dspace.org/qualifieddc/ http://www.ukoln.ac.uk/metadata/dcmi/xmlschema/qualifieddc.xsd">
<dc:title>Visualization and clustering for SNMP intrusion detection</dc:title>
<dc:creator>Sánchez, Raúl</dc:creator>
<dc:creator>Herrero Cosío, Álvaro</dc:creator>
<dc:creator>Corchado, Emilio</dc:creator>
<dc:subject>Automatic response</dc:subject>
<dc:subject>Clustering</dc:subject>
<dc:subject>Computational intelligence</dc:subject>
<dc:subject>Exploratory projection pursuit</dc:subject>
<dc:subject>k-means</dc:subject>
<dc:subject>Network intrusion detection</dc:subject>
<dcterms:abstract>Accurate intrusion detection is still an open challenge. The present work aims at being one step toward that purpose by studying the combination of clustering and visualization techniques. To do that, the mobile visualization connectionist agent-based intrusion detection system (MOVICAB-IDS), previously proposed as a hybrid intelligent IDS based on visualization techniques, is upgraded by adding automatic response thanks to clustering methods. To check the validity of the proposed clustering extension, it has been applied to the identification of different anomalous situations related to the simple network management network protocol by using real-life data sets. Different ways of applying neural projection and clustering techniques are studied in the present article. Through the experimental validation it is shown that the proposed techniques could be compatible and consequently applied to a continuous network flow for intrusion detection</dcterms:abstract>
<dcterms:dateAccepted>2015-09-30T11:25:25Z</dcterms:dateAccepted>
<dcterms:available>2015-09-30T11:25:25Z</dcterms:available>
<dcterms:created>2015-09-30T11:25:25Z</dcterms:created>
<dcterms:issued>2013-10</dcterms:issued>
<dc:type>info:eu-repo/semantics/article</dc:type>
<dc:identifier>0196-9722</dc:identifier>
<dc:identifier>http://hdl.handle.net/10259/3859</dc:identifier>
<dc:identifier>10.1080/01969722.2013.803903</dc:identifier>
<dc:language>eng</dc:language>
<dc:relation>Cybernetics and Systems: An International Journal. 2013, V. 44, n. 6-7, p. 505-532</dc:relation>
<dc:relation>http://dx.doi.org/10.1080/01969722.2013.803903</dc:relation>
<dc:relation>info:eu-repo/grantAgreement/MINECO/TIN2010-21272-C02-01</dc:relation>
<dc:relation>info:eu-repo/grantAgreement/JCyL/SA405A12-2</dc:relation>
<dc:rights>info:eu-repo/semantics/openAccess</dc:rights>
<dc:publisher>Taylor &amp; Francis</dc:publisher>
</qdc:qualifieddc></metadata></record></GetRecord></OAI-PMH>