Title :
The Optimal Application of the Algorithms of Detection and Data Mining in Honeynet
Author :
Nanping, Dong ; Guanling, Zhou ; Yuping, Wang
Author_Institution :
Coll. of Autom., Beijing Union Univ., Beijing, China
Abstract :
This paper puts forward a technical scheme which properly arranges IDS and optimally applies the algorithms of detection and data mining to the Honeynet environment based on a project of building automation system completed by the author recently. In this specific environment, the position of IDS is deployed reasonably and the anomaly and misuse detection algorithm of IDS is designed and selected optimally. Meanwhile, the misuse detection rules are updated dynamically with the combination of data-mining algorithm RIPPER. The design makes the classical and mature algorithms of anomaly detection, misuse detection and RIPPER data mining display their technical characteristics and advantages to the largest extent in the project and enable the Honeynet to protect the internal control network as expected.
Keywords :
building management systems; data mining; security of data; Honeynet; IDS; RIPPER data mining algorithm; anomaly detection algorithm; building automation system; internal control network; misuse detection algorithm; Algorithm design and analysis; Automatic control; Automation; Buildings; Control systems; Data mining; Detection algorithms; Information security; Intrusion detection; Protection; active defense; data mining; detection algorithm; honeynet; optimal design;
Conference_Titel :
Control, Automation and Systems Engineering, 2009. CASE 2009. IITA International Conference on
Conference_Location :
Zhangjiajie
Print_ISBN :
978-0-7695-3728-3
DOI :
10.1109/CASE.2009.65