Various viewpoints analysis of the actual and large-scale data by using the data mining technique

K. Tamura, K. Matsuura, H. Imai
{"title":"Various viewpoints analysis of the actual and large-scale data by using the data mining technique","authors":"K. Tamura, K. Matsuura, H. Imai","doi":"10.1109/CCST.2005.1594821","DOIUrl":null,"url":null,"abstract":"Many indiscriminate attacks represented by various computer worms happen on the Internet. These attacks, however, are not targeting at specific group of computers but all computers in the Internet. The administrator always has to grasp all activities on the Net, which is possible to take effective countermeasures against malicious activities by utilizing the logged data of IDS (intrusion detection system). So, we analyze the reliable data collected by the National Police Agency (NPA) of Japan with data mining approaches, and extract a flow of attacks with a measure of both appearance and confidence probability. Additionally, we dig deeper into the data by focusing on the difference of granularity of the Internet domains to which source hosts belong. We expect that the administrator can possess the preliminary knowledge required for defending against a possible attacks based on our results","PeriodicalId":411051,"journal":{"name":"Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology","volume":"96 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CCST.2005.1594821","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Many indiscriminate attacks represented by various computer worms happen on the Internet. These attacks, however, are not targeting at specific group of computers but all computers in the Internet. The administrator always has to grasp all activities on the Net, which is possible to take effective countermeasures against malicious activities by utilizing the logged data of IDS (intrusion detection system). So, we analyze the reliable data collected by the National Police Agency (NPA) of Japan with data mining approaches, and extract a flow of attacks with a measure of both appearance and confidence probability. Additionally, we dig deeper into the data by focusing on the difference of granularity of the Internet domains to which source hosts belong. We expect that the administrator can possess the preliminary knowledge required for defending against a possible attacks based on our results
利用数据挖掘技术对实际的大规模数据进行多角度的分析
以各种计算机蠕虫为代表的无差别攻击在互联网上时有发生。然而,这些攻击不是针对特定的计算机组,而是针对互联网上的所有计算机。管理员总是需要掌握网络上的所有活动,利用入侵检测系统的日志数据可以对恶意活动采取有效的对策。因此,我们利用数据挖掘方法对日本警察厅(NPA)收集的可靠数据进行分析,并以外观概率和置信度概率两种度量方法提取攻击流。此外,我们通过关注源主机所属的Internet域的粒度差异来深入挖掘数据。我们期望管理员能够根据我们的结果掌握防御可能的攻击所需的初步知识
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信