Intrusion prevention in depth system research based on data mining

被引:0
|
作者
Wang Jie [1 ]
Zheng Xiao [1 ]
Liu Yabin [1 ]
Shi Chenghui [1 ]
机构
[1] Zhengzhou Univ, Coll Elect Engn, Zhengzhou 450001, Peoples R China
关键词
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This paper proposes a data mining based intrusion prevention in depth system model to manage the huge amounts of unreliable and uncontrollable security events, which are generated by the extensive utilization of heterogeneous security devices in computer networks. A method of combining online detection and offline data mining is made use as the core of the model. In fact, the model is a united network security management platform used to analyze the network and host data from different layers: the kernel layer, the concentration layer and the access layer. Through improving the capture speed of network data package, the proposed model can evidently improve the efficiency of traditional IPS for detection network intrusion. This verity can be demonstrated by simulation and experiment results. Thus, the proposed intrusion prevention in depth system model can be used for defense in real-time and defense in depth.
引用
收藏
页码:376 / 382
页数:7
相关论文
共 50 条
  • [41] Research of Postal Data mining system based on big data
    Hu, Xia
    Jin, Yanfeng
    Wang, Fan
    PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON MECHATRONICS, ROBOTICS AND AUTOMATION (ICMRA 2015), 2015, 15 : 643 - 647
  • [42] Intrusion Detection Models Based on Data Mining
    Mao, Guojun
    Wu, Xindong
    Jiang, Xuxian
    INTERNATIONAL JOURNAL OF COMPUTATIONAL INTELLIGENCE SYSTEMS, 2012, 5 (01): : 30 - 38
  • [43] A data mining based intrusion detection model
    Sun, JH
    Jin, H
    Chen, H
    Han, ZF
    Zou, DQ
    INTELLIGENT DATA ENGINEERING AND AUTOMATED LEARNING, 2003, 2690 : 677 - 684
  • [44] Intrusion Detection Models Based on Data Mining
    Guojun Mao
    Xindong Wu
    Xuxian Jiang
    International Journal of Computational Intelligence Systems, 2012, 5 : 30 - 38
  • [45] Intrusion scenarios detection based on data mining
    Ding, Yu-Xin
    Wang, Hai-Sen
    Liu, Qing-Wei
    PROCEEDINGS OF 2008 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2008, : 1293 - 1297
  • [46] Data mining-based intrusion detectors
    Wu, Su-Yun
    Yen, Ester
    EXPERT SYSTEMS WITH APPLICATIONS, 2009, 36 (03) : 5605 - 5612
  • [47] Hybrid intrusion detection based on data mining
    Zhang, Lei
    Zhang, Jianqing
    Chen, Yong
    Liao, Shaowen
    2018 11TH INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTATION TECHNOLOGY AND AUTOMATION (ICICTA 2018), 2018, : 299 - 301
  • [48] The Design and Implementation of a Distributed Network Intrusion Detection System Based on Data Mining
    Fu, Desheng
    Zhou, Shu
    Guo, Ping
    2009 WRI WORLD CONGRESS ON SOFTWARE ENGINEERING, VOL 3, PROCEEDINGS, 2009, : 446 - 450
  • [49] A model of evolving intrusion detection system based on data mining and immune principle
    Zhao, JZ
    Xu, MZ
    Sun, SL
    You, L
    TENCON 2004 - 2004 IEEE REGION 10 CONFERENCE, VOLS A-D, PROCEEDINGS: ANALOG AND DIGITAL TECHNIQUES IN ELECTRICAL ENGINEERING, 2004, : B199 - B202