Applying a Flexible Mining Architecture to Intrusion Detection

M. Castellano, G. Mastronardi, A. Aprile, G. B. D. Grecis, F. Fiorino
{"title":"Applying a Flexible Mining Architecture to Intrusion Detection","authors":"M. Castellano, G. Mastronardi, A. Aprile, G. B. D. Grecis, F. Fiorino","doi":"10.1109/ARES.2007.41","DOIUrl":null,"url":null,"abstract":"Data mining is becoming a pervasive technology in several activities as using historical data to predict the success of a marketing campaign, looking for patterns in financial transactions to discover illegal activities or analyzing genome sequences. In this paper we adopt a reference flexible mining architecture able to discover knowledge in a distributed and heterogeneous environment. In the context of security, the information we are seeking is the knowledge of whether a security breach has been experienced, and if the answer is yes, who is the perpetrator. To this purpose, the guide lines of the service oriented architecture, SOA, and the orchestration model have been considered as a way to realize our proposal of knowledge discovery process to intrusion detection","PeriodicalId":383015,"journal":{"name":"The Second International Conference on Availability, Reliability and Security (ARES'07)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2007-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"The Second International Conference on Availability, Reliability and Security (ARES'07)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ARES.2007.41","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2

Abstract

Data mining is becoming a pervasive technology in several activities as using historical data to predict the success of a marketing campaign, looking for patterns in financial transactions to discover illegal activities or analyzing genome sequences. In this paper we adopt a reference flexible mining architecture able to discover knowledge in a distributed and heterogeneous environment. In the context of security, the information we are seeking is the knowledge of whether a security breach has been experienced, and if the answer is yes, who is the perpetrator. To this purpose, the guide lines of the service oriented architecture, SOA, and the orchestration model have been considered as a way to realize our proposal of knowledge discovery process to intrusion detection
灵活挖掘架构在入侵检测中的应用
数据挖掘正在成为许多活动中普遍使用的技术,如使用历史数据预测营销活动的成功,寻找金融交易模式以发现非法活动或分析基因组序列。在本文中,我们采用了一种能够在分布式和异构环境中发现知识的参考灵活挖掘架构。在安全上下文中,我们寻求的信息是关于是否经历过安全漏洞的知识,如果答案是肯定的,那么谁是肇事者。为此,将面向服务的体系结构、SOA和编排模型的指导方针作为实现入侵检测知识发现过程的一种方法
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信