The Optimal Application of the Algorithms of Detection and Data Mining in Honeynet

被引:0
|
作者
Dong Nanping [1 ]
Zhou Guanling [1 ]
Wang Yuping [1 ]
机构
[1] Beijing Union Univ, Coll Automat, Beijing, Peoples R China
来源
2009 IITA INTERNATIONAL CONFERENCE ON CONTROL, AUTOMATION AND SYSTEMS ENGINEERING, PROCEEDINGS | 2009年
关键词
data mining; detection algorithm; honeynet; optimal design; active defense;
D O I
10.1109/CASE.2009.65
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper puts forward a technical scheme which properly arranges IDS and optimally applies the algorithms of detection and data mining to the Honeynet environment based on a project of building automation system completed by the author recently. In this specific environment, the position of IDS is deployed reasonably and the anomaly and misuse detection algorithm of IDS is designed and selected optimally. Meanwhile, the misuse detection rules are updated dynamically with the combination of data-mining algorithm RIPPER. The design makes the classical and mature algorithms of anomaly detection, misuse detection and RIPPER data mining display their technical characteristics and advantages to the largest extent in the project and enable the honeynet to protect the internal control network as expected.
引用
收藏
页码:13 / 16
页数:4
相关论文
共 50 条
  • [1] The Application of the Detection and Data Mining Algorithm Optimization in Honeynet
    Dong Nanping
    Zhou Guanling
    Wang Yuping
    2009 ISECS INTERNATIONAL COLLOQUIUM ON COMPUTING, COMMUNICATION, CONTROL, AND MANAGEMENT, VOL I, 2009, : 115 - 118
  • [2] Intrusion discovery with data mining on Honeynet
    Yin, R
    Zhang, G
    Chen, YQ
    2003 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-5, PROCEEDINGS, 2003, : 41 - 45
  • [3] Optimal grid exploitation algorithms for data mining
    Fiolet, Valerie
    Olejnik, Richard
    Lefait, Guillem
    Toursel, Bernard
    ISPDC 2006: FIFTH INTERNATIONAL SYMPOSIUM ON PARALLEL AND DISTRIBUTED COMPUTING, PROCEEDINGS, 2006, : 246 - +
  • [4] Data Mining Algorithms for Traffic Interruption Detection
    Karnati, Yashaswi
    Mahajan, Dhruv
    Rangarajan, Anand
    Ranka, Sanjay
    PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON VEHICLE TECHNOLOGY AND INTELLIGENT TRANSPORT SYSTEMS (VEHITS), 2020, : 106 - 114
  • [5] The Application of Machine Learning Algorithms in Data Mining
    Zhang, Wei
    2016 INTERNATIONAL CONFERENCE ON INFORMATION ENGINEERING AND COMMUNICATIONS TECHNOLOGY (IECT 2016), 2016, : 521 - 527
  • [6] Outlier Detection Algorithms in Data Mining Systems
    M. I. Petrovskiy
    Programming and Computer Software, 2003, 29 : 228 - 237
  • [7] Detection of Phishing Emails using Data Mining Algorithms
    Smadi, Sami
    Aslam, Nauman
    Zhang, Li
    Alasem, Rafe
    Hossain, M. A.
    2015 9TH INTERNATIONAL CONFERENCE ON SOFTWARE, KNOWLEDGE, INFORMATION MANAGEMENT AND APPLICATIONS (SKIMA), 2015,
  • [8] APPLICATION OF DATA MINING ALGORITHMS IN THE MANAGEMENT OF THE BROILER PRODUCTION
    de Bastiani, Miliano
    dos Santos, Jose Airton A.
    Pizarro Schmidt, Carla Adriana
    Lopez Sepulveda, Gloria Patricia
    REVISTA GEINTEC-GESTAO INOVACAO E TECNOLOGIAS, 2018, 8 (04): : 4574 - 4587
  • [9] Gene Data Analysis for Disease Detection Using Data Mining Algorithms
    Raman, Ramakrishnan
    CARDIOMETRY, 2022, (25): : 178 - 181
  • [10] Application of Data Mining Techniques in Intrusion Detection
    Li Min
    CALL OF PAPER PROCEEDINGS OF 2008 INTERNATIONAL CONFERENCE ON MANAGEMENT SCIENCE AND ENGINEERING, 2008, : 1273 - 1277