Various viewpoints analysis of the actual and large-scale data by using the data mining technique

K. Tamura, K. Matsuura, H. Imai
{"title":"Various viewpoints analysis of the actual and large-scale data by using the data mining technique","authors":"K. Tamura, K. Matsuura, H. Imai","doi":"10.1109/CCST.2005.1594821","DOIUrl":null,"url":null,"abstract":"Many indiscriminate attacks represented by various computer worms happen on the Internet. These attacks, however, are not targeting at specific group of computers but all computers in the Internet. The administrator always has to grasp all activities on the Net, which is possible to take effective countermeasures against malicious activities by utilizing the logged data of IDS (intrusion detection system). So, we analyze the reliable data collected by the National Police Agency (NPA) of Japan with data mining approaches, and extract a flow of attacks with a measure of both appearance and confidence probability. Additionally, we dig deeper into the data by focusing on the difference of granularity of the Internet domains to which source hosts belong. We expect that the administrator can possess the preliminary knowledge required for defending against a possible attacks based on our results","PeriodicalId":411051,"journal":{"name":"Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology","volume":"96 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CCST.2005.1594821","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Many indiscriminate attacks represented by various computer worms happen on the Internet. These attacks, however, are not targeting at specific group of computers but all computers in the Internet. The administrator always has to grasp all activities on the Net, which is possible to take effective countermeasures against malicious activities by utilizing the logged data of IDS (intrusion detection system). So, we analyze the reliable data collected by the National Police Agency (NPA) of Japan with data mining approaches, and extract a flow of attacks with a measure of both appearance and confidence probability. Additionally, we dig deeper into the data by focusing on the difference of granularity of the Internet domains to which source hosts belong. We expect that the administrator can possess the preliminary knowledge required for defending against a possible attacks based on our results
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
利用数据挖掘技术对实际的大规模数据进行多角度的分析
以各种计算机蠕虫为代表的无差别攻击在互联网上时有发生。然而,这些攻击不是针对特定的计算机组,而是针对互联网上的所有计算机。管理员总是需要掌握网络上的所有活动,利用入侵检测系统的日志数据可以对恶意活动采取有效的对策。因此,我们利用数据挖掘方法对日本警察厅(NPA)收集的可靠数据进行分析,并以外观概率和置信度概率两种度量方法提取攻击流。此外,我们通过关注源主机所属的Internet域的粒度差异来深入挖掘数据。我们期望管理员能够根据我们的结果掌握防御可能的攻击所需的初步知识
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
On the effects of image quality degradation on minutiae- and ridge-based automatic fingerprint recognition Face recognition with small and large size databases Biometric verification of humans by means of hand geometry Security, Internet connectivity and aircraft data networks The X-ray object recognition test (X-ray ORT) - a reliable and valid instrument for measuring visual abilities needed in X-ray screening
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1