{"title":"基于群的入侵行为知识发现","authors":"Xiaohui Cui, Justin M. Beaver, T. Potok","doi":"10.1109/CYBERC.2010.56","DOIUrl":null,"url":null,"abstract":"In this research, we developed a technique, the Swarm-based Visual Data Mining approach (SVDM), that will help user to gain insight into the Intrusion Detection System (IDS) alert event data stream, come up with new hypothesis, and verify the hypothesis via the interaction between the human and the system. This novel malicious user detection system can efficiently help security officer detect anomaly behaviors of malicious user in the high dimensional time dependent state spaces. This system's visual representations exploit the human being's innate ability to recognize patterns and utilize this ability to help security manager understand the relationships between seemingly discrete security breaches.","PeriodicalId":315132,"journal":{"name":"2010 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","volume":"87 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Swarm-Based Knowledge Discovery for Intrusion Behavior Discovering\",\"authors\":\"Xiaohui Cui, Justin M. Beaver, T. Potok\",\"doi\":\"10.1109/CYBERC.2010.56\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this research, we developed a technique, the Swarm-based Visual Data Mining approach (SVDM), that will help user to gain insight into the Intrusion Detection System (IDS) alert event data stream, come up with new hypothesis, and verify the hypothesis via the interaction between the human and the system. This novel malicious user detection system can efficiently help security officer detect anomaly behaviors of malicious user in the high dimensional time dependent state spaces. This system's visual representations exploit the human being's innate ability to recognize patterns and utilize this ability to help security manager understand the relationships between seemingly discrete security breaches.\",\"PeriodicalId\":315132,\"journal\":{\"name\":\"2010 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery\",\"volume\":\"87 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2010-10-10\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2010 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CYBERC.2010.56\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2010 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CYBERC.2010.56","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Swarm-Based Knowledge Discovery for Intrusion Behavior Discovering
In this research, we developed a technique, the Swarm-based Visual Data Mining approach (SVDM), that will help user to gain insight into the Intrusion Detection System (IDS) alert event data stream, come up with new hypothesis, and verify the hypothesis via the interaction between the human and the system. This novel malicious user detection system can efficiently help security officer detect anomaly behaviors of malicious user in the high dimensional time dependent state spaces. This system's visual representations exploit the human being's innate ability to recognize patterns and utilize this ability to help security manager understand the relationships between seemingly discrete security breaches.