首页> 外文会议>International conference on information technology: new generations >Applying Data Mining Techniques to Intrusion Detection
【24h】

Applying Data Mining Techniques to Intrusion Detection

机译:将数据挖掘技术应用于入侵检测

获取原文

摘要

In our current society, the threat of cyber intrusion is increasingly high and harmful. With the rise of usage in computers, criminal activity has also shifted from physical intrusion into cyber intrusion. Intrusion detection systems provide the ability to identify security breaches in a system. A security breach will be any action the owner of the system deems unauthorized. Current methods used for these systems include using anomaly detection or a signature database. In this research we use both anomaly detection and a signature database using data mining techniques. Our solution provides a tool that would run data mining tools against a log file to detect patterns that may be considered an unauthorized activity. The tool gains additional patterns as time goes by and grows more effective. It allowed us to detect brute force password cracking and Denial-of-Service (DoS) attacks on a system in the Ubuntu platform.
机译:在我们当前的社会中,网络侵入的威胁越来越高,有害。随着计算机使用的兴起,犯罪活动也从物理入侵转向网络侵入。入侵检测系统提供识别系统中安全漏洞的能力。安全漏洞将是任何行动,系统所有者认为未经授权。用于这些系统的当前方法包括使用异常检测或签名数据库。在本研究中,我们使用Anomaly检测和使用数据挖掘技术的签名数据库。我们的解决方案提供了一种工具,它将针对日志文件运行数据挖掘工具,以检测可能被视为未授权的活动的模式。随着时间的推移,该工具可以获得额外的模式并增长更有效。它允许我们检测Ubuntu平台中系统的蛮力密码开裂和拒绝服务(DOS)攻击。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号