首页> 外文会议>IEEE International Workshop on Intelligent Data Acquisition and Advanced Computing Systems >Towards Data Mining Temporal Patterns for Anomaly Intrusion Detection Systems
【24h】

Towards Data Mining Temporal Patterns for Anomaly Intrusion Detection Systems

机译:朝向异常入侵检测系统的数据挖掘时间模式

获取原文

摘要

A reasonably light-weight host and net-centric Network IDS architecture model is indicated. The model is anomaly based on a state-driven notion of "anomaly". Therefore, the relevant distribution function need not remain constant; it could migrate from states to states -without any a priori warning so long as its residency time at a next steady state is sufficiently long to make valid observations there. Only those intrusion events (basically DOS and DDOS variety) capable of triggering anomalous streams of attacks/response both near and/or far of target monitoring point(s) are considered at the first level of detection. At the next level of detection, the filtered states could be fine-combed in a batch mode to mine unacceptable strings of commands or known attack signatures.
机译:指示了一个合理的轻量级主机和以网络为中心的网络ID架构模型。该模型是基于“异常”的状态驱动的概念异常。因此,相关分布函数不需要保持不变;它可以从各种状态迁移到排除任何先验的警告,只要其居住时间以下一个稳定状态足够长,可以在那里进行有效的观察。在第一级检测水平中考虑,只有能够触发靠近和/或远的异常攻击/响应的那些入侵事件(基本上DOS和DDOS变化)。在下一级别的检测中,滤波状态可以以批处理模式进行微妙的梳理,以挖掘不可接受的命令或已知攻击签名。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号