首页> 外文会议>International Ccnference on Computer Applications in Industry and Engineering >Data Mining Strategies From Network Intrusion Detection As Applied To Identifying High-Risk Containers
【24h】

Data Mining Strategies From Network Intrusion Detection As Applied To Identifying High-Risk Containers

机译:从网络入侵检测的数据挖掘策略应用于识别高风险容器

获取原文

摘要

Due to the increased importance recently placed on national security and preventing terrorist attacks, we feel that developing a methodology for detecting high-risk containers at our ports is critical to maintaining a sense of security in the United States. Utilizing data mining principles which have been applied to the concept of Network Intrusion Detection, we have developed a proposed methodology for categorizing containers as they arrive at U.S. ports so as to identify containers which may pose a threat in time to search them and prevent them from entering the United States to be used for harm. We feel that network intrusion detection is a good basis for a methodology for preventing high-risk containers from entering the United States because of the similarities the two topics share. Network intrusion detection is the process of identifying connections to a network which are abnormal, which do not behave as a normal connection would. Similarly, detecting high-risk containers is the process of identifying containers which do not fit the standard profile. Maybe the containers are from an unknown shipper, maybe they were handled by an unknown warehouse or ship, and maybe they went through more than the average number of ports on their way to the country. Whatever the anomaly may be in a container, it is the key to identifying that container as a threat. Because anomaly detection is also the key to identifying network intrusions, we feel that the underlying principles utilized in network intrusion detection can be effectively applied to high-risk container detection. In this paper we discuss the similarities between the two application areas and propose a modular design for a system for detecting high-risk containers, which utilizes three approaches from the area of network intrusion detection.
机译:由于最近涉及国家安全和预防恐怖主义攻击的重要性,我们觉得开发用于在港口的高风险集装箱中制定一种方法对于维持美国的安全感至关重要。利用已经应用于网络入侵检测概念的数据挖掘原则,我们开发了一种提出的方​​法,用于将容器进行分类,因为它们到达美国端口,以便识别可能及时造成威胁以搜索并防止它们的容器进入美国用于伤害。我们认为,网络入侵检测是防止高风险容器进入美国的方法的良好基础,因为相似之处,这两个主题份额。网络入侵检测是识别与网络异常的连接的过程,这不会表现为正常连接。类似地,检测高风险容器是识别不符合标准配置文件的容器的过程。也许容器来自一个不知名的托运人,也许他们被一个未知的仓库或船舶处理,也许他们在前往国家的路上经过了超过平均港口数量。无论异常如何在容器中,它都是将该容器识别为威胁的关键。由于异常检测也是识别网络入侵的关键,所以我们认为网络入侵检测中使用的基本原理可以有效地应用于高风险容器检测。在本文中,我们讨论了两个应用领域之间的相似性,并提出了一种用于检测高风险容器的系统的模块化设计,其利用网络入侵检测区域的三种方法。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号