{"title":"Various viewpoints analysis of the actual and large-scale data by using the data mining technique","authors":"K. Tamura, K. Matsuura, H. Imai","doi":"10.1109/CCST.2005.1594821","DOIUrl":null,"url":null,"abstract":"Many indiscriminate attacks represented by various computer worms happen on the Internet. These attacks, however, are not targeting at specific group of computers but all computers in the Internet. The administrator always has to grasp all activities on the Net, which is possible to take effective countermeasures against malicious activities by utilizing the logged data of IDS (intrusion detection system). So, we analyze the reliable data collected by the National Police Agency (NPA) of Japan with data mining approaches, and extract a flow of attacks with a measure of both appearance and confidence probability. Additionally, we dig deeper into the data by focusing on the difference of granularity of the Internet domains to which source hosts belong. We expect that the administrator can possess the preliminary knowledge required for defending against a possible attacks based on our results","PeriodicalId":411051,"journal":{"name":"Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology","volume":"96 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CCST.2005.1594821","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Many indiscriminate attacks represented by various computer worms happen on the Internet. These attacks, however, are not targeting at specific group of computers but all computers in the Internet. The administrator always has to grasp all activities on the Net, which is possible to take effective countermeasures against malicious activities by utilizing the logged data of IDS (intrusion detection system). So, we analyze the reliable data collected by the National Police Agency (NPA) of Japan with data mining approaches, and extract a flow of attacks with a measure of both appearance and confidence probability. Additionally, we dig deeper into the data by focusing on the difference of granularity of the Internet domains to which source hosts belong. We expect that the administrator can possess the preliminary knowledge required for defending against a possible attacks based on our results