【24h】

Clustering as an add-on for firewalls

机译:群集作为防火墙的附加组件

获取原文
获取原文并翻译 | 示例

摘要

The necessary spread of the access points to network services makes them vulnerable to many potential and different types of attackers: script kiddies, hackers, and misfeasors. Although the network services produce a great quantity of data logged by hosts, it is impossible for a security officer, and generally for a network administrator, to monitor daily generated traffic in order to control attacks. Currently a LAN is defended with a mixture of solutions adopted at different levels. Commercial firewalls typically use descriptive statistics to give the security officer information about the quantitative characteristics of the TCP/IP traffic as a whole. In this work, we generate information on the "profile" of connections by means of clustering techniques. This approach makes the security officer able to detect connections that are far away from the mass. We use different clustering techniques in order to study their response for this type of problem. Results on real traffic data are reported and commented.
机译:接入点在网络服务上的必要分布使它们容易受到许多潜在和不同类型的攻击者的攻击:脚本小子,黑客和渎职者。尽管网络服务会生成大量由主机记录的数据,但对于安全人员(通常对于网络管理员)来说,它无法监视每日生成的流量以控制攻击。当前,LAN受到不同级别采用的混合解决方案的保护。商业防火墙通常使用描述性统计信息来向安全员提供有关整体TCP / IP流量的定量特征的信息。在这项工作中,我们通过聚类技术生成有关连接“配置文件”的信息。这种方法使安全员能够检测到远离群众的连接。为了研究他们对此类问题的响应,我们使用了不同的聚类技术。报告和评论实际流量数据的结果。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号