【24h】

A Framework for Evaluating Clustering Algorithm

机译:评估聚类算法的框架

获取原文

摘要

Security is an important issue for building and sustaining trust relationship in cloud computing and in the usage of web-based applications. Consequently, intrusion detectors that adopt allowable and disallowable concepts are used in network forensics. The disallowable policy enforcers alert on events that are known to be bad while the allowable policy enforcers monitor events that deviate from known good. Nevertheless, sophisticated cases of computer attacks often render attempts to isolate failed attacks from successful attacks ineffective. Thus, attacks are erroneous interpreted and most successful cases of computer attacks are not forestalled while in progress despite the huge volume of warnings that intrusion detectors generate beforehand. Therefore, we present a new clustering algorithm to lessen these problems. Series of evaluations showed how to adopt category utility to improve the efficacies of methods for detecting and preventing intrusions. The results also differentiated failed attacks on computer resources from successful attacks.
机译:安全是在云计算和基于Web的应用程序的使用中建立和维持信任关系的重要问题。因此,在网络取证中使用采用允许和不允许概念的入侵检测器。不允许的策略执行者会警告已知为不良的事件,而允许的策略执行者会监视偏离已知良好的事件。然而,复杂的计算机攻击案例常常使试图将失败的攻击与成功的攻击隔离开的尝试是无效的。因此,尽管入侵检测器事先会产生大量警告,但对攻击的解释是错误的,并且在进行过程中不会阻止大多数成功的计算机攻击案例。因此,我们提出了一种新的聚类算法以减轻这些问题。系列评估显示了如何采用类别实用程序来提高检测和防止入侵的方法的效率。结果也将对计算机资源的失败攻击与成功攻击区分开来。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号