Research Article

Mining Network Traffic with the -Means Clustering Algorithm for Stepping-Stone Intrusion Detection

Figure 3

A connection chain of length four (from the sensor host S1 to the victim’s host).