Title :
Overview of the Data Mining Applications in Network Defense in Depth
Author :
Zan, Yang ; Lin, Yang ; Lin-ru, Ma ; Xiao-ming, Liu
Author_Institution :
Inst. of Command Autom., PLAUST, Nanjing, China
Abstract :
This paper briefly introduces the network boundaries can be effectively protected using network defense in depth system and the shortcomings of its technical means. Then introduced the data mining technology applications in the firewall policy optimization, traffic identification, intrusion detection technology areas at different levels of defense in depth, and lists a variety of specific application modes, which can effectively enhance the dynamic adaptation and automated optimization capabilities of defense in depth system to a wide range of network attacks and traffic flow changes.
Keywords :
authorisation; computer network security; data mining; optimisation; telecommunication traffic; automated optimization capability; data mining application; dynamic adaptation; firewall policy optimization; intrusion detection technology; network attacks; network boundary protection; network defense; traffic flow; traffic identification; Algorithm design and analysis; Clustering algorithms; Data mining; Fires; Intrusion detection; Optimization; data mining; defense in depth; intrusion detection; policy optimization; traffic identification;
Conference_Titel :
Instrumentation, Measurement, Computer, Communication and Control, 2011 First International Conference on
Conference_Location :
Beijing
Print_ISBN :
978-0-7695-4519-6
DOI :
10.1109/IMCCC.2011.128