• DocumentCode
    3348978
  • Title

    Overview of the Data Mining Applications in Network Defense in Depth

  • Author

    Zan, Yang ; Lin, Yang ; Lin-ru, Ma ; Xiao-ming, Liu

  • Author_Institution
    Inst. of Command Autom., PLAUST, Nanjing, China
  • fYear
    2011
  • fDate
    21-23 Oct. 2011
  • Firstpage
    491
  • Lastpage
    494
  • Abstract
    This paper briefly introduces the network boundaries can be effectively protected using network defense in depth system and the shortcomings of its technical means. Then introduced the data mining technology applications in the firewall policy optimization, traffic identification, intrusion detection technology areas at different levels of defense in depth, and lists a variety of specific application modes, which can effectively enhance the dynamic adaptation and automated optimization capabilities of defense in depth system to a wide range of network attacks and traffic flow changes.
  • Keywords
    authorisation; computer network security; data mining; optimisation; telecommunication traffic; automated optimization capability; data mining application; dynamic adaptation; firewall policy optimization; intrusion detection technology; network attacks; network boundary protection; network defense; traffic flow; traffic identification; Algorithm design and analysis; Clustering algorithms; Data mining; Fires; Intrusion detection; Optimization; data mining; defense in depth; intrusion detection; policy optimization; traffic identification;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Instrumentation, Measurement, Computer, Communication and Control, 2011 First International Conference on
  • Conference_Location
    Beijing
  • Print_ISBN
    978-0-7695-4519-6
  • Type

    conf

  • DOI
    10.1109/IMCCC.2011.128
  • Filename
    6154153