Applying data mining techniques to analyze alert data

被引:0
|
作者
Shin, M
Moon, H
Ryu, K
Kim, K
Kim, J
机构
[1] Chungbuk Natl Univ, Database Lab, Cheongju, Chungbuk, South Korea
[2] Elect & Telecommun Res Inst, Network Secur Dept, Taejon 305606, South Korea
来源
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Architecture of the policy-based network management has a hierarchical structure that consists of management layer and enforcement layer. A security policy server in the management layer should be able to generate new policy, delete, update the existing policy and decide the policy when security policy is requested. Therefore the security policy server must analyze and manage alert messages received from policy enforcement system. In this paper, we propose an alert analyzer with data mining engine. It is a helpful system to manage the fault users or hosts. The implemented mining system supports the alert analyzer and the high level analyzer efficiently for the security policy management.
引用
收藏
页码:193 / 200
页数:8
相关论文
共 50 条
  • [1] Applying Mining Techniques to Analyze Vestibular Data
    Mirarchi, Domenico
    Petrolo, Claudio
    Canino, Giovanni
    Vizza, Patrizia
    Cuomo, Salvatore
    Chiarella, Giuseppe
    Veltri, Pierangelo
    [J]. 7TH INTERNATIONAL CONFERENCE ON EMERGING UBIQUITOUS SYSTEMS AND PERVASIVE NETWORKS (EUSPN 2016)/THE 6TH INTERNATIONAL CONFERENCE ON CURRENT AND FUTURE TRENDS OF INFORMATION AND COMMUNICATION TECHNOLOGIES IN HEALTHCARE (ICTH-2016), 2016, 98 : 467 - 472
  • [2] Applying data mining techniques to analyze the causes of major occupational accidents in the petrochemical industry
    Cheng, Ching-Wu
    Yao, Hong-Qing
    Wu, Tsung-Chih
    [J]. JOURNAL OF LOSS PREVENTION IN THE PROCESS INDUSTRIES, 2013, 26 (06) : 1269 - 1278
  • [3] Impact of Data Mining Techniques to Analyze Health Care Data
    Saeed, Soobia
    Shaikh, Asadullah
    Memon, Muhammad Ali
    Naqvi, Syed Mehmood Raza
    [J]. JOURNAL OF MEDICAL IMAGING AND HEALTH INFORMATICS, 2018, 8 (04) : 682 - 690
  • [4] Applying Data Mining Techniques in Healthcare
    Ionita, Irina
    Ionita, Liviu
    [J]. STUDIES IN INFORMATICS AND CONTROL, 2016, 25 (03): : 385 - 394
  • [5] Process of applying data mining techniques to XML data
    Nayak, Richi
    [J]. ADVANCES IN INTELLIGENT IT: ACTIVE MEDIA TECHNOLOGY 2006, 2006, 138 : 67 - 72
  • [6] Applying Data Mining Techniques in Cyber Crimes
    Khan, Mohiuddin Ali
    Pradhan, Sateesh Kumar
    Fatima, Huda
    [J]. 2017 2ND INTERNATIONAL CONFERENCE ON ANTI-CYBER CRIMES (ICACC), 2017, : 213 - 216
  • [7] Applying data mining techniques to wafer manufacturing
    Bertino, E
    Catania, B
    Caglio, E
    [J]. PRINCIPLES OF DATA MINING AND KNOWLEDGE DISCOVERY, 1999, 1704 : 41 - 50
  • [8] Applying Data Mining Techniques to Intrusion Detection
    Ng, Jonathon
    Joshi, Deepti
    Banik, Shankar M.
    [J]. 2015 12TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY - NEW GENERATIONS, 2015, : 800 - 801
  • [9] Data mining techniques to analyze traffic accidents data: Case application in Morocco
    Touzani, Halima Drissi
    Faquir, Sanaa
    Yahyaouy, Ali
    [J]. 2020 FOURTH INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING IN DATA SCIENCES (ICDS), 2020,
  • [10] Applying Semantic Techniques to Search and Analyze Bug Tracking Data
    Ha Manh Tran
    Christoph Lange
    Georgi Chulkov
    Jürgen Schönwälder
    Michael Kohlhase
    [J]. Journal of Network and Systems Management, 2009, 17 : 285 - 308