Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Levent Ertoz is active.

Publication


Featured researches published by Levent Ertoz.


Archive | 2004

The Challenges of Clustering High Dimensional Data

Michael Steinbach; Levent Ertoz; Vipin Kumar

Cluster analysis divides data into groups (clusters) for the purposes of summarization or improved understanding. For example, cluster analysis has been used to group related documents for browsing, to find genes and proteins that have similar functionality, or as a means of data compression. While clustering has a long history and a large number of clustering techniques have been developed in statistics, pattern recognition, data mining, and other fields, significant challenges still remain. In this chapter we provide a short introduction to cluster analysis, and then focus on the challenge of clustering high dimensional data. We present a brief overview of several recent techniques, including a more detailed description of recent work of our own which uses a concept-based clustering approach.


Clustering and Information Retrieval | 2004

Finding Topics in Collections of Documents: A Shared Nearest Neighbor Approach

Levent Ertoz; Michael Steinbach; Vipin Kumar

Given a set of documents, clustering is often used to group the documents, in the hope that each group will represent documents with a common theme or topic. Initially, hierarchical clustering was used to cluster documents [5]. This approach has the advantage of producing a set of nested document clusters, which can be interpreted as a topic hierarchy or tree, from general to more specific topics. In practice, while the clusters at different levels of the hierarchy sometimes represent documents with consistent topics, it is common for many clusters to be a mixture of topics, even at lower, more refined levels of the hierarchy. More recently, as document collections have grown larger, K-means clustering has emerged as a more efficient approach for producing clusters of documents [4, 9, 16]. K-means clustering produces a set of un-nested clusters, and the top (most frequent or highest ”weight”) terms of the cluster are used to characterize the topic of the cluster. Once again, it is not unusual for some clusters to be mixtures of topics.


PROCEEDINGS OF SPIE SPIE - The International Society for Optical Engineering:Battlespace Digitization and Network-Centric Systems III | 2003

Protecting against cyber threats in networked information systems

Levent Ertoz; Aleksandar Lazarevic; Eric Eilertson; Pang Ning Tan; Paul Dokas; Vipin Kumar; Jaideep Srivastava

This paper provides an overview of our efforts in detecting cyber attacks in networked information systems. Traditional signature based techniques for detecting cyber attacks can only detect previously known intrusions and are useless against novel attacks and emerging threats. Our current research at the University of Minnesota is focused on developing data mining techniques to automatically detect attacks against computer networks and systems. This research is being conducted as a part of MINDS (Minnesota Intrusion Detection System) project at the University of Minnesota. Experimental results on live network traffic at the University of Minnesota show that the new techniques show great promise in detecting novel intrusions. In particular, during the past few months our techniques have been successful in automatically identifying several novel intrusions that could not be detected using state-of-the-art tools such as SNORT.


Archive | 2007

Minds: Architecture & Design

Varun Chandola; Eric Eilertson; Levent Ertoz; Gyorgy Simon; Vipin Kumar

This chapter provides an overview of the Minnesota Intrusion Detection System (MINDS), which uses a suite of data mining based algorithms to address different aspects of cyber security. The various components of MINDS such as the scan detector, anomaly detector and the profiling module detect different types of attacks and intrusions on a computer network. The scan detector aims at detecting scans which are the percusors to any network attack. The anomaly detection algorithm is very effective in detecting behavioral anomalies in the network traffic which typically translate to malicious activities such as denial-of-service (DoS) traffic, worms, policy violations and inside abuse. The profiling module helps a network analyst to understand the characteristics of the network traffic and detect any deviations from the normal profile. Our analysis shows that the intrusions detected by HINDS are complementary to those of traditional signature based systems, such as SNORT, which implies that they both can be combined to increase overall attack coverage. MINDS has shown great operational success in detecting network intrusions in two live deployments at the University of Minnesota and as a part of the Interrogator architecture at the US Army Research Lab — Center for Intrusion Monitoring and Protection (ARL-CIMP).


international conference on conceptual structures | 2007

DDDAS/ITR: A Data Mining and Exploration Middleware for Grid and Distributed Computing

Jon B. Weissman; Vipin Kumar; Varun Chandola; Eric Eilertson; Levent Ertoz; Gyorgy Simon; Seonho Kim; Jinoh Kim

We describe our project that marries data mining together with Grid computing. Specifically, we focus on one data mining application - the Minnesota Intrusion Detection System (MINDS), which uses a suite of data mining based algorithms to address different aspects of cyber security including malicious activities such as denial-of-service (DoS) traffic, worms, policy violations and inside abuse. MINDS has shown great operational success in detecting network intrusions in several real deployments. In sophisticated distributed cyber attacks using a multitude of wide-area nodes, combining the results of several MINDS instances can enable additional early-alert cyber security. We also describe a Grid service system that can deploy and manage multiple MINDS instances across a wide-area network.


siam international conference on data mining | 2003

A Comparative Study of Anomaly Detection Schemes in Network Intrusion Detection.

Aleksandar Lazarevic; Levent Ertoz; Vipin Kumar; Aysel Ozgur; Jaideep Srivastava


siam international conference on data mining | 2003

Finding Clusters of Different Sizes, Shapes, and Densities in Noisy, High Dimensional Data.

Levent Ertoz; Michael Steinbach; Vipin Kumar


Archive | 2002

Data Mining for Network Intrusion Detection

Paul Dokas; Levent Ertoz; Vipin Kumar; Aleksandar Lazarevic; Jaideep Srivastava; Pang Ning Tan


Archive | 2002

A new shared nearest neighbor clustering algorithm and its applications

Levent Ertoz; Michael Steinbach; Vipin Kumar


siam international conference on data mining | 2003

Detection of Novel Network Attacks Using Data Mining

Levent Ertoz; Eric Eilertson; Aleksandar Lazarevic; Pang Ning Tan; Paul Dokas; Vipin Kumar; Jaideep Srivastava

Collaboration


Dive into the Levent Ertoz's collaboration.

Top Co-Authors

Avatar

Vipin Kumar

University of Minnesota

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Jaideep Srivastava

Qatar Computing Research Institute

View shared research outputs
Top Co-Authors

Avatar

Gyorgy Simon

University of Minnesota

View shared research outputs
Top Co-Authors

Avatar

Pang Ning Tan

Michigan State University

View shared research outputs
Top Co-Authors

Avatar

Paul Dokas

University of Minnesota

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge