DocumentCode :
3348978
Title :
Overview of the Data Mining Applications in Network Defense in Depth
Author :
Zan, Yang ; Lin, Yang ; Lin-ru, Ma ; Xiao-ming, Liu
Author_Institution :
Inst. of Command Autom., PLAUST, Nanjing, China
fYear :
2011
fDate :
21-23 Oct. 2011
Firstpage :
491
Lastpage :
494
Abstract :
This paper briefly introduces the network boundaries can be effectively protected using network defense in depth system and the shortcomings of its technical means. Then introduced the data mining technology applications in the firewall policy optimization, traffic identification, intrusion detection technology areas at different levels of defense in depth, and lists a variety of specific application modes, which can effectively enhance the dynamic adaptation and automated optimization capabilities of defense in depth system to a wide range of network attacks and traffic flow changes.
Keywords :
authorisation; computer network security; data mining; optimisation; telecommunication traffic; automated optimization capability; data mining application; dynamic adaptation; firewall policy optimization; intrusion detection technology; network attacks; network boundary protection; network defense; traffic flow; traffic identification; Algorithm design and analysis; Clustering algorithms; Data mining; Fires; Intrusion detection; Optimization; data mining; defense in depth; intrusion detection; policy optimization; traffic identification;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Instrumentation, Measurement, Computer, Communication and Control, 2011 First International Conference on
Conference_Location :
Beijing
Print_ISBN :
978-0-7695-4519-6
Type :
conf
DOI :
10.1109/IMCCC.2011.128
Filename :
6154153
Link To Document :
بازگشت