The Optimal Application of the Algorithms of Detection and Data Mining in Honeynet

被引:0
|
作者
Dong Nanping [1 ]
Zhou Guanling [1 ]
Wang Yuping [1 ]
机构
[1] Beijing Union Univ, Coll Automat, Beijing, Peoples R China
关键词
data mining; detection algorithm; honeynet; optimal design; active defense;
D O I
10.1109/CASE.2009.65
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper puts forward a technical scheme which properly arranges IDS and optimally applies the algorithms of detection and data mining to the Honeynet environment based on a project of building automation system completed by the author recently. In this specific environment, the position of IDS is deployed reasonably and the anomaly and misuse detection algorithm of IDS is designed and selected optimally. Meanwhile, the misuse detection rules are updated dynamically with the combination of data-mining algorithm RIPPER. The design makes the classical and mature algorithms of anomaly detection, misuse detection and RIPPER data mining display their technical characteristics and advantages to the largest extent in the project and enable the honeynet to protect the internal control network as expected.
引用
收藏
页码:13 / 16
页数:4
相关论文
共 50 条
  • [31] Application of data mining technology to intrusion detection system
    Xia, HX
    Qi, S
    Rui, H
    DCABES 2004, Proceedings, Vols, 1 and 2, 2004, : 1027 - 1030
  • [32] Data mining approach to web application intrusions detection
    Kalicki, Arkadiusz
    PHOTONICS APPLICATIONS IN ASTRONOMY, COMMUNICATIONS, INDUSTRY, AND HIGH-ENERGY PHYSICS EXPERIMENTS 2011, 2011, 8008
  • [33] The Application of Data Mining Technology in the Intrusion Detection System
    Jia, Zongpu
    Jin, Shichao
    THIRD INTERNATIONAL SYMPOSIUM ON COMPUTER SCIENCE AND COMPUTATIONAL TECHNOLOGY (ISCSCT 2010), 2010, : 208 - 211
  • [34] Application of Data Mining Techniques for Defect Detection and Classification
    Prakash, B. V. Ajay
    Ashoka, D. V.
    Aradya, V. N. Manjunath
    PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON FRONTIERS OF INTELLIGENT COMPUTING: THEORY AND APPLICATIONS (FICTA) 2014, VOL 1, 2015, 327 : 387 - 395
  • [35] Application of Data Mining on the Design of Intrusion Detection System
    Chang Zhen-yun
    Du Yan-fang
    2011 INTERNATIONAL CONFERENCE ON ELECTRONICS, COMMUNICATIONS AND CONTROL (ICECC), 2011, : 1890 - 1893
  • [36] Research on the Application of the Data Mining in Network Intrusion Detection
    Shen, Wei
    2014 2ND INTERNATIONAL CONFERENCE ON ECONOMIC, BUSINESS MANAGEMENT AND EDUCATION INNOVATION (EBMEI 2014), VOL 38, 2014, 38 : 234 - 237
  • [37] Application of image data mining techniques in fire detection
    Li, Ting
    DCABES 2006 Proceedings, Vols 1 and 2, 2006, : 671 - 672
  • [38] An application of data mining techniques on earnings management detection
    Hsieh, Yung-Ming (armin@scu.edu.tw), 2016, ICIC Express Letters Office (07):
  • [39] Application of data mining algorithms to TCP throughput prediction in HTTP transactions
    Borzemski, Leszek
    Kliber, Marta
    Nowak, Ziemowit
    NEW FRONTIERS IN APPLIED ARTIFICIAL INTELLIGENCE, 2008, 5027 : 159 - 168
  • [40] The Application Of Apriori-BSO algorithms in Medical Records Data Mining
    Wang Renli
    Dai Yueming
    Dong Liming
    2016 IEEE INFORMATION TECHNOLOGY, NETWORKING, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (ITNEC), 2016, : 827 - 832