Title :
Application of Cloud Model in Intrusion Detection
Author :
Wang, Deguang ; Zhou, Zhigang
Author_Institution :
Software Technol., Dalian Jiaotong Univ., Dalian, China
Abstract :
Intrusion detection is defined as a computer network system to collect information on a number of key points, and analyze this information from the security audit, monitoring, attack recognition and response, etc. to see whether there are violations of network security policy behavior and signs of attack. The classification of the data is the key to intrusion detection. It is faced how to extract the suspect data from the magnanimous data. This article applies cloud model in intrusion detection, and we can obtain the invasion data sets effectively.
Keywords :
Internet; computer network security; pattern classification; attack recognition; attack response; cloud model; computer network system; data classification; intrusion detection; network security policy behavior; security audit; Application software; Clouds; Computer networks; Computer security; Computerized monitoring; Data security; Face detection; Information analysis; Information security; Intrusion detection;
Conference_Titel :
e-Business and Information System Security (EBISS), 2010 2nd International Conference on
Conference_Location :
Wuhan
Print_ISBN :
978-1-4244-5893-6
Electronic_ISBN :
978-1-4244-5895-0
DOI :
10.1109/EBISS.2010.5473507