Intrusion prevention in depth system research based on data mining

被引:0
|
作者
Wang Jie [1 ]
Zheng Xiao [1 ]
Liu Yabin [1 ]
Shi Chenghui [1 ]
机构
[1] Zhengzhou Univ, Coll Elect Engn, Zhengzhou 450001, Peoples R China
关键词
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This paper proposes a data mining based intrusion prevention in depth system model to manage the huge amounts of unreliable and uncontrollable security events, which are generated by the extensive utilization of heterogeneous security devices in computer networks. A method of combining online detection and offline data mining is made use as the core of the model. In fact, the model is a united network security management platform used to analyze the network and host data from different layers: the kernel layer, the concentration layer and the access layer. Through improving the capture speed of network data package, the proposed model can evidently improve the efficiency of traditional IPS for detection network intrusion. This verity can be demonstrated by simulation and experiment results. Thus, the proposed intrusion prevention in depth system model can be used for defense in real-time and defense in depth.
引用
收藏
页码:376 / 382
页数:7
相关论文
共 50 条
  • [31] The Development of Computer Network Intrusion Detection System Based on Data Mining
    Shan, Chen
    MECHANICAL, MATERIALS AND MANUFACTURING ENGINEERING, PTS 1-3, 2011, 66-68 : 2248 - 2251
  • [32] Intrusion Detection System Based on Data Mining Technics for Industrial Networks
    Sapozhnikova, M. U.
    Nikonov, A., V
    Vulfin, A. M.
    2018 INTERNATIONAL CONFERENCE ON INDUSTRIAL ENGINEERING, APPLICATIONS AND MANUFACTURING (ICIEAM), 2018,
  • [33] Data mining based design for the detection engine of the intrusion detection system
    Lu, Xi-Xiang
    Yang, Bo
    Pei, Chang-Xing
    Su, Xiao-Long
    Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University, 2004, 31 (04): : 574 - 580
  • [34] Research on CBR system based on data mining
    Guo, Yuan
    Hu, Jie
    Peng, Yinghong
    APPLIED SOFT COMPUTING, 2011, 11 (08) : 5006 - 5014
  • [35] Integrating Intrusion Detection System and Data Mining
    Yusufovna, Sattarova Feruza
    INTERNATIONAL SYMPOSIUM ON UBIQUITOUS MULTIMEDIA COMPUTING, PROCEEDINGS, 2008, : 256 - 259
  • [36] Research on Real-time Intrusion Detection Technology Based on Data Mining
    Fan Zhiqin
    Wang Mian
    PROCEEDINGS OF THE 2018 3RD INTERNATIONAL WORKSHOP ON MATERIALS ENGINEERING AND COMPUTER SCIENCES (IWMECS 2018), 2018, 78 : 171 - 175
  • [37] Research of the Optimization of a Data Mining Algorithm Based on an Embedded Data Mining System
    Wang, Xindi
    Chen, Mengfei
    Chen, Li
    CYBERNETICS AND INFORMATION TECHNOLOGIES, 2013, 13 (13) : 5 - 17
  • [38] Research on regional intrusion prevention and control system based on target tracking
    Liu, Yanfei
    Wang, Jieling
    Jiang, Ke
    He, Yanhui
    Wu, Zhilin
    2ND ANNUAL INTERNATIONAL CONFERENCE ON INFORMATION SYSTEM AND ARTIFICIAL INTELLIGENCE (ISAI2017), 2017, 887
  • [39] Research on the Application of the Data Mining in Network Intrusion Detection
    Shen, Wei
    2014 2ND INTERNATIONAL CONFERENCE ON ECONOMIC, BUSINESS MANAGEMENT AND EDUCATION INNOVATION (EBMEI 2014), VOL 38, 2014, 38 : 234 - 237
  • [40] Research into the Network Security Model Blended of Data Stream Mining and Intrusion Detection System
    Zhu Lin
    Zhu Can-Shi
    PROCEEDINGS OF 2012 7TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE & EDUCATION, VOLS I-VI, 2012, : 496 - 499