The necessary spread of the access points to network services makes them vulnerable to many potential and different types of attackers: script kiddies, hackers, and misfeasors. Although the network services produce a great quantity of data logged by hosts, it is impossible for a security officer, and generally for a network administrator, to monitor daily generated traffic in order to control attacks. Currently a LAN is defended with a mixture of solutions adopted at different levels. Commercial firewalls typically use descriptive statistics to give the security officer information about the quantitative characteristics of the TCP/IP traffic as a whole. In this work, we generate information on the "profile" of connections by means of clustering techniques. This approach makes the security officer able to detect connections that are far away from the mass. We use different clustering techniques in order to study their response for this type of problem. Results on real traffic data are reported and commented.
机构:
Shanghai Univ Finance & Econ, Coll Business, Shanghai 200433, Peoples R ChinaShanghai Univ Finance & Econ, Coll Business, Shanghai 200433, Peoples R China
Yin, Qianbo
Huang, Kwei-Long
论文数: 0引用数: 0
h-index: 0
机构:
Natl Taiwan Univ, Inst Ind Engn, Taipei 106, TaiwanShanghai Univ Finance & Econ, Coll Business, Shanghai 200433, Peoples R China
Huang, Kwei-Long
Kuo, Chia-Wei
论文数: 0引用数: 0
h-index: 0
机构:
Natl Taiwan Univ, Dept Business Adm, Taipei 106, TaiwanShanghai Univ Finance & Econ, Coll Business, Shanghai 200433, Peoples R China
Kuo, Chia-Wei
Zhou, Sean X.
论文数: 0引用数: 0
h-index: 0
机构:
Chinese Univ Hong Kong, CUHK Business Sch, Shatin, Hong Kong, Peoples R ChinaShanghai Univ Finance & Econ, Coll Business, Shanghai 200433, Peoples R China