Intrusion prevention in depth system research based on data mining

被引:0
|
作者
Wang Jie [1 ]
Zheng Xiao [1 ]
Liu Yabin [1 ]
Shi Chenghui [1 ]
机构
[1] Zhengzhou Univ, Coll Elect Engn, Zhengzhou 450001, Peoples R China
关键词
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This paper proposes a data mining based intrusion prevention in depth system model to manage the huge amounts of unreliable and uncontrollable security events, which are generated by the extensive utilization of heterogeneous security devices in computer networks. A method of combining online detection and offline data mining is made use as the core of the model. In fact, the model is a united network security management platform used to analyze the network and host data from different layers: the kernel layer, the concentration layer and the access layer. Through improving the capture speed of network data package, the proposed model can evidently improve the efficiency of traditional IPS for detection network intrusion. This verity can be demonstrated by simulation and experiment results. Thus, the proposed intrusion prevention in depth system model can be used for defense in real-time and defense in depth.
引用
收藏
页码:376 / 382
页数:7
相关论文
共 50 条
  • [21] Network Intrusion Detection System Model Based on Data Mining
    Zhao, Yanjie
    2016 17TH IEEE/ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING AND PARALLEL/DISTRIBUTED COMPUTING (SNPD), 2016, : 155 - 160
  • [22] Network intrusion detection based on system calls and data mining
    Xinguang Tian
    Xueqi Cheng
    Miyi Duan
    Rui Liao
    Hong Chen
    Xiaojuan Chen
    Frontiers of Computer Science in China, 2010, 4 : 522 - 528
  • [23] Research on Network Intrusion Detection Technology Based on Data Mining Technology
    Zhou, Lijun
    Lv, Hong
    Zhao, Yuan
    PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON MECHATRONICS AND INDUSTRIAL INFORMATICS, 2015, 31 : 444 - 450
  • [24] The Research about Data Mining of Network Intrusion Based on Apriori Algorithm
    Zheng, Jigang
    Zhang, Jingmei
    PROCEEDINGS OF THE 2015 INTERNATIONAL SYMPOSIUM ON COMPUTERS & INFORMATICS, 2015, 13 : 888 - 892
  • [25] Research on Intrusion Data Mining Algorithm Based on Multiple Minimum Support
    Zeng Zhihua
    Zhou Bing
    Li Cong
    2019 INTERNATIONAL CONFERENCE ON INTELLIGENT TRANSPORTATION, BIG DATA & SMART CITY (ICITBS), 2019, : 297 - 301
  • [26] The Research about Data Mining of Network Intrusion Based on Apriori Algorithm
    Zheng, Jigang
    Zhang, Jingmei
    PROCEEDINGS OF THE 2016 7TH INTERNATIONAL CONFERENCE ON EDUCATION, MANAGEMENT, COMPUTER AND MEDICINE (EMCM 2016), 2017, 59 : 661 - 664
  • [27] Approach Research on the Techniques for Network Intrusion Detection Based on Data Mining
    Gong Lina
    Xu Tao
    Zhang Wei
    Li XuHong
    Wang Xia
    Pan Wenwen
    PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON APPLIED SCIENCE AND ENGINEERING INNOVATION, 2015, 12 : 2133 - 2136
  • [28] Intrusion Detection Based on Data Mining
    Oreku, George S.
    Mtenzi, Fredrick J.
    EIGHTH IEEE INTERNATIONAL CONFERENCE ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, PROCEEDINGS, 2009, : 696 - 701
  • [29] Intrusion detection based on data mining
    Yin, Jian
    Mei, Fang
    Zhang, Gang
    COMPUTATIONAL INTELLIGENCE, PT 2, PROCEEDINGS, 2006, 4114 : 724 - 729
  • [30] Realization of Intrusion Detection System based on the Improved Data Mining Technology
    Zhao Yan Jun
    Wei Ming Jun
    Wang Jing
    PROCEEDINGS OF THE 2013 8TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE & EDUCATION (ICCSE 2013), 2013, : 982 - 987