{"title":"A guarded cross-site mining architecture of systems security information","authors":"R. Goel, J. Humphries","doi":"10.1109/IAW.2005.1495996","DOIUrl":null,"url":null,"abstract":"This research effort provides a framework for a system that can securely fuse the intelligence from these sources, while completing the computing and communication in an efficient manner. We develop an architecture for a guarded cross-site mining system; this is designed to extract patterns and attack/intrusion indications as possible and utilize parallel processing of all relevant information available, while protecting sensitive information. This solution harnesses the power of the distributed computing environment by applying expert systems locally before aggregating data (instead of processing all at once at one central location). Furthermore, previously established theories for privacy preserving data mining may now be utilized for information assurance purposes.","PeriodicalId":252208,"journal":{"name":"Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop","volume":"106 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2005-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IAW.2005.1495996","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
This research effort provides a framework for a system that can securely fuse the intelligence from these sources, while completing the computing and communication in an efficient manner. We develop an architecture for a guarded cross-site mining system; this is designed to extract patterns and attack/intrusion indications as possible and utilize parallel processing of all relevant information available, while protecting sensitive information. This solution harnesses the power of the distributed computing environment by applying expert systems locally before aggregating data (instead of processing all at once at one central location). Furthermore, previously established theories for privacy preserving data mining may now be utilized for information assurance purposes.