• DocumentCode
    2483286
  • Title

    Application of Cloud Model in Intrusion Detection

  • Author

    Wang, Deguang ; Zhou, Zhigang

  • Author_Institution
    Software Technol., Dalian Jiaotong Univ., Dalian, China
  • fYear
    2010
  • fDate
    22-23 May 2010
  • Firstpage
    1
  • Lastpage
    4
  • Abstract
    Intrusion detection is defined as a computer network system to collect information on a number of key points, and analyze this information from the security audit, monitoring, attack recognition and response, etc. to see whether there are violations of network security policy behavior and signs of attack. The classification of the data is the key to intrusion detection. It is faced how to extract the suspect data from the magnanimous data. This article applies cloud model in intrusion detection, and we can obtain the invasion data sets effectively.
  • Keywords
    Internet; computer network security; pattern classification; attack recognition; attack response; cloud model; computer network system; data classification; intrusion detection; network security policy behavior; security audit; Application software; Clouds; Computer networks; Computer security; Computerized monitoring; Data security; Face detection; Information analysis; Information security; Intrusion detection;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    e-Business and Information System Security (EBISS), 2010 2nd International Conference on
  • Conference_Location
    Wuhan
  • Print_ISBN
    978-1-4244-5893-6
  • Electronic_ISBN
    978-1-4244-5895-0
  • Type

    conf

  • DOI
    10.1109/EBISS.2010.5473507
  • Filename
    5473507