The System Architecture of Scalable Network Threat Waring Platform

Article Preview

Abstract:

In this paper, based on the SOA design of a large-scale network monitoring data for anomaly detection and alarm system architecture, focusing on the anomaly detection model and network threat early warning model to do an in-depth study and analysis.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

242-246

Citation:

Online since:

July 2013

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] MCGRAW G,MORR ISETT G . Attacking malicious code: a report to the infosec research council[ J ]. I EEE Soft wa re , 2000, 17 (5) : 33241 .

DOI: 10.1109/52.877857

Google Scholar

[2] LEEW, STOLFO S J,MOK KW. A data mining framework for building intrusi on detection models[ C ] / /Proc of IEEE Security and Privacy . 1999: 1202 132.

Google Scholar

[3] JON H, PASCAL M. Can s ource code auditing s oft ware identify com2mon vulnerabilities and be used to evaluate s oft ware security [ C ] / /Proc of the 37 th Annual Hawaii I nternati onal Conference on System Sciences . 2004: 440524414.

DOI: 10.1109/hicss.2004.1265654

Google Scholar

[4] Mahoney M V, Chan P K. An analysis of t he 1999 DARPAΠ Lincoln Laboratory evaluation data for network anomaly detection [ C] Π Π Proc of t he 6t h Int Symp on Recent Advances in Int rusion Detection. Berlin : Springer , 2003 : 2202237

DOI: 10.1007/978-3-540-45248-5_13

Google Scholar

[5] Yatagai T , Isohara T , Sasase I. Detection of HTTP2GET flood at tack based on analysis of page access behavior [ C] Π Π Proc of 2007 IEEE Pacific Rim Conf on Communications ,Computers and Signal Processing. Piscataway , NJ : IEEE ,2007 : 2322235

DOI: 10.1109/pacrim.2007.4313218

Google Scholar

[6] Wang K, Stolfo S J . Anomalous payload2based networkint rusion detection [ C] Π Π Proc of t he 7t h Int Symp on Recent Advances in Int rusion Detection. Berlin : Springer , 2004 :2032222

Google Scholar

[7] Yu S Z , Kobayashi H. An efficient forward2backward lgorit hm for an explicit2duration hidden Markov model [J ] .IEEE Signal Processing Let ters , 2003 , 10 (1) : 11214

Google Scholar