{"title":"配置检测是计算机网络中的知识发现问题","authors":"Y. Murayama","doi":"10.1109/COOPIS.1997.613801","DOIUrl":null,"url":null,"abstract":"Presents a type of knowledge discovery that is slightly different from data mining in database systems-configuration detection in computer networks. In computer networks, one needs to know which objects exist and where they are located. We call the acquisition of this knowledge \"configuration detection\". We are interested in hosts and routers on an internetwork within an organization. As internetworking has become popular, the growth in the number of network objects has been substantial and dynamic. In such an environment, the maintenance of knowledge of the current configuration of the network has become a practical problem. The scale problem has been solved either by facilitating dynamic learning or by dividing the management domain into subdomains of a manageable size. In either solution, we face the problems of inconsistency and invalidity. We suggest the use of a procedure for the authorisation of network addresses to solve some of the serious network-level threats using a security technique. Finally, we apply the solution to address resolution.","PeriodicalId":293694,"journal":{"name":"Proceedings of CoopIS 97: 2nd IFCIS Conference on Cooperative Information Systems","volume":"57 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1997-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Configuration detection as a problem of knowledge discovery in computer networks\",\"authors\":\"Y. Murayama\",\"doi\":\"10.1109/COOPIS.1997.613801\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Presents a type of knowledge discovery that is slightly different from data mining in database systems-configuration detection in computer networks. In computer networks, one needs to know which objects exist and where they are located. We call the acquisition of this knowledge \\\"configuration detection\\\". We are interested in hosts and routers on an internetwork within an organization. As internetworking has become popular, the growth in the number of network objects has been substantial and dynamic. In such an environment, the maintenance of knowledge of the current configuration of the network has become a practical problem. The scale problem has been solved either by facilitating dynamic learning or by dividing the management domain into subdomains of a manageable size. In either solution, we face the problems of inconsistency and invalidity. We suggest the use of a procedure for the authorisation of network addresses to solve some of the serious network-level threats using a security technique. Finally, we apply the solution to address resolution.\",\"PeriodicalId\":293694,\"journal\":{\"name\":\"Proceedings of CoopIS 97: 2nd IFCIS Conference on Cooperative Information Systems\",\"volume\":\"57 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1997-06-24\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings of CoopIS 97: 2nd IFCIS Conference on Cooperative Information Systems\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/COOPIS.1997.613801\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of CoopIS 97: 2nd IFCIS Conference on Cooperative Information Systems","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/COOPIS.1997.613801","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Configuration detection as a problem of knowledge discovery in computer networks
Presents a type of knowledge discovery that is slightly different from data mining in database systems-configuration detection in computer networks. In computer networks, one needs to know which objects exist and where they are located. We call the acquisition of this knowledge "configuration detection". We are interested in hosts and routers on an internetwork within an organization. As internetworking has become popular, the growth in the number of network objects has been substantial and dynamic. In such an environment, the maintenance of knowledge of the current configuration of the network has become a practical problem. The scale problem has been solved either by facilitating dynamic learning or by dividing the management domain into subdomains of a manageable size. In either solution, we face the problems of inconsistency and invalidity. We suggest the use of a procedure for the authorisation of network addresses to solve some of the serious network-level threats using a security technique. Finally, we apply the solution to address resolution.