The Optimal Application of the Algorithms of Detection and Data Mining in Honeynet

被引:0
|
作者
Dong Nanping [1 ]
Zhou Guanling [1 ]
Wang Yuping [1 ]
机构
[1] Beijing Union Univ, Coll Automat, Beijing, Peoples R China
关键词
data mining; detection algorithm; honeynet; optimal design; active defense;
D O I
10.1109/CASE.2009.65
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper puts forward a technical scheme which properly arranges IDS and optimally applies the algorithms of detection and data mining to the Honeynet environment based on a project of building automation system completed by the author recently. In this specific environment, the position of IDS is deployed reasonably and the anomaly and misuse detection algorithm of IDS is designed and selected optimally. Meanwhile, the misuse detection rules are updated dynamically with the combination of data-mining algorithm RIPPER. The design makes the classical and mature algorithms of anomaly detection, misuse detection and RIPPER data mining display their technical characteristics and advantages to the largest extent in the project and enable the honeynet to protect the internal control network as expected.
引用
收藏
页码:13 / 16
页数:4
相关论文
共 50 条
  • [1] The Application of the Detection and Data Mining Algorithm Optimization in Honeynet
    Dong Nanping
    Zhou Guanling
    Wang Yuping
    2009 ISECS INTERNATIONAL COLLOQUIUM ON COMPUTING, COMMUNICATION, CONTROL, AND MANAGEMENT, VOL I, 2009, : 115 - 118
  • [2] Intrusion discovery with data mining on Honeynet
    Yin, R
    Zhang, G
    Chen, YQ
    2003 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-5, PROCEEDINGS, 2003, : 41 - 45
  • [3] Visualization of Misuse-Based Intrusion Detection: Application to Honeynet Data
    Zurutuza, Urko
    Ezpeleta, Enaitz
    Herrero, Alvaro
    Corchado, Emilio
    SOFT COMPUTING MODELS IN INDUSTRIAL AND ENVIRONMENTAL APPLICATIONS, 6TH INTERNATIONAL CONFERENCE SOCO 2011, 2011, 87 : 561 - 570
  • [4] Outlier Detection Algorithms in Data Mining
    Xi, Jingke
    2008 INTERNATIONAL SYMPOSIUM ON INTELLIGENT INFORMATION TECHNOLOGY APPLICATION, VOL I, PROCEEDINGS, 2008, : 94 - 97
  • [5] Optimal grid exploitation algorithms for data mining
    Fiolet, Valerie
    Olejnik, Richard
    Lefait, Guillem
    Toursel, Bernard
    ISPDC 2006: FIFTH INTERNATIONAL SYMPOSIUM ON PARALLEL AND DISTRIBUTED COMPUTING, PROCEEDINGS, 2006, : 246 - +
  • [6] Research on Data Mining Detection Algorithms for Abnormal Data
    Yang, Yanying
    International Journal of Network Security, 2023, 25 (01) : 32 - 36
  • [7] Outlier detection algorithms in data mining systems
    Petrovskiy, MI
    PROGRAMMING AND COMPUTER SOFTWARE, 2003, 29 (04) : 228 - 237
  • [8] Application of Data Mining Algorithms for Mammogram Classification
    Radovic, Milos
    Djokovic, Marina
    Peulic, Aleksandar
    Filipovic, Nenad
    2013 IEEE 13TH INTERNATIONAL CONFERENCE ON BIOINFORMATICS AND BIOENGINEERING (BIBE), 2013,
  • [9] Data Mining Algorithms for Traffic Interruption Detection
    Karnati, Yashaswi
    Mahajan, Dhruv
    Rangarajan, Anand
    Ranka, Sanjay
    PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON VEHICLE TECHNOLOGY AND INTELLIGENT TRANSPORT SYSTEMS (VEHITS), 2020, : 106 - 114
  • [10] Outlier Detection Algorithms in Data Mining Systems
    M. I. Petrovskiy
    Programming and Computer Software, 2003, 29 : 228 - 237