DocumentCode
3348978
Title
Overview of the Data Mining Applications in Network Defense in Depth
Author
Zan, Yang ; Lin, Yang ; Lin-ru, Ma ; Xiao-ming, Liu
Author_Institution
Inst. of Command Autom., PLAUST, Nanjing, China
fYear
2011
fDate
21-23 Oct. 2011
Firstpage
491
Lastpage
494
Abstract
This paper briefly introduces the network boundaries can be effectively protected using network defense in depth system and the shortcomings of its technical means. Then introduced the data mining technology applications in the firewall policy optimization, traffic identification, intrusion detection technology areas at different levels of defense in depth, and lists a variety of specific application modes, which can effectively enhance the dynamic adaptation and automated optimization capabilities of defense in depth system to a wide range of network attacks and traffic flow changes.
Keywords
authorisation; computer network security; data mining; optimisation; telecommunication traffic; automated optimization capability; data mining application; dynamic adaptation; firewall policy optimization; intrusion detection technology; network attacks; network boundary protection; network defense; traffic flow; traffic identification; Algorithm design and analysis; Clustering algorithms; Data mining; Fires; Intrusion detection; Optimization; data mining; defense in depth; intrusion detection; policy optimization; traffic identification;
fLanguage
English
Publisher
ieee
Conference_Titel
Instrumentation, Measurement, Computer, Communication and Control, 2011 First International Conference on
Conference_Location
Beijing
Print_ISBN
978-0-7695-4519-6
Type
conf
DOI
10.1109/IMCCC.2011.128
Filename
6154153
Link To Document