首页> 外文会议>International Conference on Data Mining >Clustering as an add-on for firewalls
【24h】

Clustering as an add-on for firewalls

机译:群集作为防火墙的加载项

获取原文

摘要

The necessary spread of the access points to network services makes them vulnerable to many potential and different types of attackers: script kiddies, hackers, and misfeasors. Although the network services produce a great quantity of data logged by hosts, it is impossible for a security officer, and generally for a network administrator, to monitor daily generated traffic in order to control attacks. Currently a LAN is defended with a mixture of solutions adopted at different levels. Commercial firewalls typically use descriptive statistics to give the security officer information about the quantitative characteristics of the TCP/IP traffic as a whole. In this work, we generate information on the "profile" of connections by means of clustering techniques. This approach makes the security officer able to detect connections that are far away from the mass. We use different clustering techniques in order to study their response for this type of problem. Results on real traffic data are reported and commented.
机译:接入点到网络服务的必要传播使他们容易受到许多潜在和不同类型的攻击者:脚本婴儿,黑客和误操作。虽然网络服务产生了由主机记录的大量数据,但是安全官员不可能为网络管理员提供监视日常生成的流量以控制攻击。目前,LAN被捍卫,并在不同层次采用的解决方案混合。商业防火墙通常使用描述性统计信息来为安全官员提供有关整个TCP / IP流量的定量特征的信息。在这项工作中,我们通过聚类技术生成有关连接的“配置文件”的信息。这种方法使安全官能够检测远离质量的连接。我们使用不同的聚类技术来研究他们对这种问题的响应。报告并评论了实际交通数据的结果。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号